Movatterモバイル変換


[0]ホーム

URL:


US9646150B2 - Electronic identity and credentialing system - Google Patents

Electronic identity and credentialing system
Download PDF

Info

Publication number
US9646150B2
US9646150B2US14/503,797US201414503797AUS9646150B2US 9646150 B2US9646150 B2US 9646150B2US 201414503797 AUS201414503797 AUS 201414503797AUS 9646150 B2US9646150 B2US 9646150B2
Authority
US
United States
Prior art keywords
credential
identity
owner
user
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US14/503,797
Other versions
US20150095999A1 (en
Inventor
Kalman Csaba Toth
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US14/503,797priorityCriticalpatent/US9646150B2/en
Publication of US20150095999A1publicationCriticalpatent/US20150095999A1/en
Priority to US15/497,635prioritypatent/US9900309B2/en
Application grantedgrantedCritical
Publication of US9646150B2publicationCriticalpatent/US9646150B2/en
Priority to US15/898,617prioritypatent/US10127378B2/en
Priority to US16/188,117prioritypatent/US10756906B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Described is an electronic credentialing system that allows personal identity devices to interact; each interacting device has an installed identity engine that acquires, holds, issues and uses electronic credentials (e-credentials), these electronic credentials can be installed on personal identity devices, such as: smart phones, tablets, laptops, embedded systems, and/or personal computers.

Description

CROSS REFERENCE TO RELATED APPLICATIONS
The present application claims the benefit of U.S. Provisional Patent Application No. 61/885,251, filed on Oct. 1, 2013 and entitled “Electronic Identity and Credentialing System”, which is herein incorporated by reference in its entirety.
BACKGROUND
The present invention relates to the field of identity provisioning and usage over information networks. The scope traverses identity, credentials, credentialing, also known as identity provisioning, identity assurance, security, privacy, confidentiality, authentication, encryption, and identity management. To assist interpreting the field and scope, a glossary of terms relating to this field is provided as well figures and a list of reference numerals. To ensure personal privacy while provisioning reliable identities for citizens and consumers, the specification, handling and deployment of personal identities needs to be modernized. To date, the provisioning of identities and credentials have been primarily the prevue of web service providers. For identity and credentialing to scale up and become significantly more trusted than existing schemes, individual persons must become increasingly engaged in vetting the identities of other persons and the issuing of credentials to them. Credential owners must be able to reliably and safely control their identities, and unauthorized persons should not be able to fraudulently use the identities of others.
In the real world, physical credentials such as driver's licenses and passports attesting to the identity of the holder are primarily issued by governments, banks, employers, and other types of organizations. Notably, the agents and HR departments of such organizations perform most of the necessary vetting and proofing procedures prior to credential issuance. Physical credentials are rarely issued by individuals to other individuals. However, notaries can issue certified true copies of documents to individuals, and professional engineers, doctors and other professionals can certify true copies of personal identifying information (e.g. passport applications).
Over the Internet, prior art Public Key Infrastructure (PKI), a hierarchical trust model, is the predominant identity provisioning scheme by which identities, in the form of digital certificates, are distributed electronically to enterprises—rarely to individuals. Another technology, Pretty Good Privacy (PGP), a web-of-trust model focused on the identity needs of individuals, employs digital certificates to enable secure communications among personal computers. PGP has enjoyed limited market penetration and was not specified to integrate with PKI. The escalating problems of electronic identity theft and fraud have not been solved by either of these technologies. The present invention significantly improves upon prior art PKI and PGP technologies.
E-fraud is perpetrated over information networks, such as the Internet and cellular networks, by way of identity theft, identity abuse, electronic stalking, spamming, advertising abuse, obfuscation, phishing and deception. Service providers and enterprise systems have been rapidly losing ground in their battle against web-based identity abuse and e-fraud, mainly because today's identity providers and technologies are not able to deliver identities to individuals that can only be readily used by the identity owner. As the Internet continues to grow rapidly in both size and complexity, the providers of web services and end-user computing devices are increasingly hard-pressed to keep up with the escalating breaches, compromised identities, and fraudulent activities—all widely reported across the web.
The essential difficulty in the field of electronic identity is that communicating parties are often unknown to each other, yet they need to conduct transactions with each other as if they were meeting face-to-face. In most circumstances today, a web user as well as a web server cannot be really sure who they are communicating with. Users may wonder if the web site they are visiting is bogus; if their service provider has been properly protecting their accounts and credit cards; if a virus or Trojan software is collecting their private information; or if a blog post is from an imposter or a stalker. The user is obliged to rely on legacy technologies that may be defective, poorly configured, and poorly administered.
For example, account/password authentication schemes are known to be vulnerable to compromise enabling user masquerade (spoofing), denial-of-service, and other abuses. The problems of users and servers managing multiple passwords, re-used passwords, weak passwords, and password resets are widely known. Furthermore, successful access into a system with account/password login only proves that the holder of the account has knowledge of the password; it does not validate the identity of the person knowing the password.
For remote parties to collaborate safely over the web, they need to be able to reliably authenticate each other over a communications channel that cannot be sniffed (read) or tampered with. In other words, they need to be strongly bound to each other across every hop from origination to destination (“end-to-end”).
Single sign-on (SSO) and federated identity frameworks and technologies have addressed some of the challenges of enrolling users, specifying accounts and permissions, containing password proliferation, and managing user passwords. However, the structures for specifying user identities are fragmented, the methods for defining and issuing them are ad hoc, and effective credential interoperability does not exist at this time.
A wide variety of biometric technologies have emerged over the years and have been integrated into personal computers, smart phones, smart cards and various types of security tokens. Digital certificates have also been deployed on smart card technologies and USB thumb drives. Notably, FIPS PUB 201-2 [1] for Personal Identity Verification (PIV) specifies a smart-card based identity card and related systems deployed by the U.S. Federal government.
The approach taken herein leverages selected aspects of prior art identity technologies and emulates identity issuance and usage in the physical world. Such an approach can be expected to facilitate adoption. Consider a driver's license. Such a credential bears the name and selected attributes of the owner, a photograph, the owner's signature, and certain endorsements and restrictions. After “proofing” the applicant against provided identifying information, the agent issues the license to the applicant. When used, the license attests to the owner's identity which the issuer cannot easily repudiate. If the license is borrowed or stolen and subsequently presented by someone other than the owner, the photograph and signature can be used by others to detect fraudulent use.
The present invention follows a similar process employing “personal identity devices”. A wide range of electronic credentials can be specified therein such that they are information-wise equivalent to civil and consumer credentials such as driver's licenses, bank cards, employee IDs, and even business cards. Users, some of whom may be agents of identity provisioning services, are able to collaborate and securely exchange electronic identities that have been proofed and attested to by other users (issuers). The issuer's identity is cryptographically bound to the owner's electronic identity preventing the issuer from repudiating their attestation thereby elevating assurances for 3rdparties. The personal identity device also leverages user authentication data to bind the user to their electronic identities. These features combine to elevate privacy, prevent identity tampering, and prevent others from using electronic credentials to masquerade as the identity owner.
The present invention specifies an electronic identity and credentialing system that combines and adapts prior art to achieve the following distinct features and capabilities:
    • Mimics identities and credentialing as practiced in the physical world to facilitate adoption;
    • Leverages growing population of consumers owning personal devices to create personal identity devices;
    • Enables personal identity device owners to specify, control, proof, attest to, issue, and use their identities for assured collaboration among themselves and secure web access;
    • Persistently binds owners to their identity devices, and hence their identities (e-credentials) and associated secrets (e.g. private keys and biometric minutia), by controlling local user authentication data;
      Combines and adapts prior art, preventing 3rdparty masquerade, such that only a personal identity device owner can employ one of their identities (E-credentials of an owner can be provided to other parties, however, these other parties cannot use them to execute designated privileged operations).
    • To execute privileged operations that ensure:
      • Messages, digitally signed under the owner's e-credential, were originated by that same owner;
      • Only the owner can read messages encrypted employing an e-credential of the owner;
      • Artifacts digitally sealed under the owner's e-credential must have been affixed by the owner (An e-credential owner cannot repudiate having applied their e-credential to digitally sign a message);
    • Another user, having received a copy of an owner's e-credential, can challenge a user claiming to be that owner, thereby obtaining assurances that the provided e-credential actually represents the claimed owner;
    • Owners of personal identity devices can use their e-credentials in concert with the e-credentials of other owners to establish persistent, mutually trusted, secure sessions executing the above privileged operations;
    • An e-credential issuer can proof the personal identifying information of an e-credential requester, issuing a digitally sealed e-credential to the requester that attests to the requester's identity.
    • Users with personal identity devices and e-credentials that have been digitally sealed can thereby establish secure channels among themselves wherein they have positive assurances as to the other party's identity.
U.S. Pat. No. 7,660,988 by Camechael et al. discloses an electronic notary process (“e-notary”) wherein a notary and client can share a workstation, log onto a remote system, and notarize a submitted document by means of a cryptographic scheme that creates a record of the notarization event in the system's online repository. The present invention makes no claims related to using a centralized database to perform electronic notarization, instead specifying a distributed approach whereby users can attest to (e.g. notarize) each other's electronic documents and credentials using personally held identity devices.
WO2005020542 by Salim Aissi et al. discloses a method that binds a public key to specific hardware with an embedded private key to verify the identity and integrity of the trusted computing device. In contrast, the present invention, by means of a personal identity device held by the device owner, binds personal identities of the owner, including public and private keys associated with each identity, to the owner.
EP 2460307 by Jeffery B. Williams et al. discloses a system and methods for strong remote identity proofing, obtaining biographical information from the individual, and using this information to search public data repositories. No claims related to obtaining biographical information to search data depositories for identities are made herein.
EP 1470534 by Vipin Samar et al discloses a method and apparatus for authenticating an individual's identity by validating a credential and corresponding public key, and comparing biometric data with sample data. No claims are made herein specifying any given biometric scheme or biometric data. Rather, the present invention encapsulates authentication data utilized by biometric mechanisms pre-installed on the personal identity device of the user.
EP 1130491 by Corella et al. discloses a method for structuring a digital certificate comprised of multiple authorization hashes that a relying party can use to access relevant authorization information. The present invention does not claim to create, filter, mask or hash authorization data that relying parties can use to make authorization decisions. In contrast, the present invention creates identities that can be provided to other parties to make authorization decisions outside the context and scope of the present invention.
U.S. Pat. No. 8,127,228 by Cheng et al. discloses a method and a system for electronic document management based on human memory wherein a digital seal is a personalized association mnemonic applied to a document comprised of, for example, icons and text. This prior art does not appear to apply cryptography, while the present invention uses cryptography, creating digital seals that can be visually rendered and cannot be repudiated by the e-credential owner;
U.S. Pat. No. 7,310,734 by Boate et al. discloses an improved network security system, methods and a personal identifier device, used to control network access and real time authentication of a user's identity and presence at a particular network access point. Biometric verification and cryptography is provided on-board the portable personal digital identifier device to provide authenticated digital signatures which are used for establishing secure access to data stored on a network and for performing secure transactions over a network. Biometric authentication is used to verify user presence, and biometric data is used to create digital signatures, subsequently used for secure access. In contrast, the present invention does not perform biometric verification or matching, or use biometric data to create digital signatures, instead holding authentication data, including biometric minutia, within an identity engine, and relying on an authentication control interfaced to a pre-existing biometric module (assumed to be present), to invoke user authentication and thereby establish user persistence.
U.S. Pat. No. 8,019,691 by Dominguez et al. discloses methods and systems for authenticating the identity and validating the profile data of an individual (presenter) who presents him or herself to another party (acceptor) performed online, possibly querying a trusted party for profile data. Although the present invention leverages an equivalent procedure called “identity proofing”, the administrative (human) details of such a procedure are not specified and are incidental to the present claims. The present invention does, however, specify artifacts and methods needed to enable mutually trusted sessions between requesters and issuers when conducting identity proofing, a feature that is not addressed by this prior art.
U.S. Pat. No. 6,401,206 by Khan et al. discloses methods and computer programs for creating a portable digital identity of the individual that may include personal information, data representing the person's handwritten signature, one or more passwords, seals, fingerprints, biometric information, and answers to questions that are composed by the user. The digital identity can be used to bind a verifiable electronic impression with an electronic document using electronic watermarks so that any modification in the document or the electronic impression bound to the document can be detected. The digital identity of a user can be created once and stored after encryption for protection. This digital identity can then be used by the signer to bind a unique instance of an impression of the digital identity to any document. Document and digital identity verification including verifying a cryptographic digital signature that establishes the integrity of the document, enables non-repudiation of origin to the extent that it was signed by the user's private key.
An e-credential does not contain handwritten signature, passwords, biometric data (e.g. fingerprint minutia), answers to user questions, or other such sensitive information because an e-credential is normally disclosed to collaborating parties to support user collaboration. Also, the present invention does not attempt to generate public-private key pairs from personal identifying information to apply a cryptographic signature to documents, choosing instead to create three (3) public-private key pairs, embedding the public keys in the user's e-credential, and retaining the private keys in protected memory store (possibly removable) of the personal identity device which is strongly bound to the user. The present invention uses two of these public-private keys to support secure remote collaboration, which the prior art does not, reserving one of the key pairs for digital sealing and verifying of electronic documents. This prior art discloses that it ensures non-repudiation to the extent that the cryptographic signature was signed by the user's private key. In contrast, the present invention ensures that the private key (the “embossing” key) used to digitally seal an electronic document, is persistently in the custody of the user, thereby elevating non-repudiation strength over this prior art.
Password and PIN-based authentication schemes, despite their acknowledged weaknesses, continue to be used because of their ease-of-use and ease-of-implementation properties. Password-based remote password authentication schemes, including those using Personal Identity Numbers (PINs), have been long-demonstrated to be vulnerable to user masquerade. Local password and PIN-based schemes are less vulnerable as such user secrets are not exposed over intervening networks. However, the all too common practice has been for users to employ the same passwords and PINs for both local and remote access.
Employing a number of fairly straight-forward exploits (e.g. sniffing and social engineering) and readily available software tools for password-cracking, a malicious attacker can defeat traditional PIN and password-based authentication, using the acquired private information (account numbers and identifiers) and user secrets (the PINs and passwords themselves) to fraudulently tamper with online accounts. Risks can be reduced by introducing guidelines for creating stronger passwords, automated procedures for creating non-guessable passwords, augmenting these schemes with non-guessable security questions, incorporating behavioral analysis, detection, automated blocking tools, implementing safer account reset procedures, and elevating user awareness of social engineering attacks and scams providing avoidance advice. Routine reuse of the same and similar passwords and PINs should be prohibited or at least strongly discouraged.
Pioneered by Liberty Alliance and other players in the late 1990s and early 2000s, single-sign-on (SSO) solutions federate identity provisioning and access enabling users to be authenticated in a small number of places, or possibly at a single centralized location. Such approaches can significantly reduce the number of PINs and passwords required, however, they require users to be authenticated online at points of consolidation and centralization that must in turn be networked to achieve deployment on a wide-spread, potentially global scale. The consolidation points present attractive targets for various cyber-attacks.
The present invention promotes a distributed approach for identity acquisition and provisioning that promises to be highly scalable and avoids the above-cited weaknesses of password and PIN-based remote access schemes.
Fingerprint, facial, and iris recognition schemes are commercially viable for deployment on user platforms (e.g. PCs and smart phones). Ma in reports the relative accuracy of available biometrics in terms of false positive rates with facial recognition at 43%, fingerprint at 30%, signature at 28%, voice at 20%, and iris recognition at only 0.47%. This helps explain the growing interest in iris biometrics.
User preferences for biometric schemes, matching accuracy, matching performance, human risks factors, and compatibility with the individual circumstances can vary widely, implying that solutions should offer users a range of biometric options for remote user authentication.
Meanwhile, emerging biometric signatures leveraging the body's venous, nervous and DNA systems are being studied by research institutions and can be expected to emerge over time. This observation suggests that biometric-based identity solutions should be extensible, accommodating add-on biometric technologies in a modular fashion as they emerge.
As users become better informed about the privacy risks posed by global networks, users are also becoming increasingly skeptical about systems that maintain biometric minutia and templates for biometric matching at consolidated and centralized locations. This suggests that biometric authentication schemes should de-centralize biometric capture and matching, putting such sensitive operations in the custody and control of users, that is, within their personal devices.
The inventive subject matter described herein advocates an authentication approach that consolidates biometric minutia (i.e. authentication data), regardless of the type of biometric, into a personal device controlled by the user which enables incorporating a range of biometric options that can be integrated in a modular fashion.
Multi-factor authentication technologies have been emerging and being increasingly advocated. Multiple authentication factors can be applied jointly to reduce the probability of failed authentication due to the compromise or fallibility of any given factor or factors. MFA typically addresses “What the user knows” (PIN, password, responses to questions), “What the user has or holds” (smart card, smart phone, FOB), and “What the user is” (iris, fingerprint, facial and other biometrics). Geo-location and behavioral authentication schemes are also factors that can be incorporated.
Extant solutions include 2-factor authentication schemes for banking that use a PIN and chip card (a smart card), hardware tokens that generate one-time-passwords (OTPs) for remote terminal logon, and smart phone solutions that integrate the text messaging channel of the phone to distribute OTPs to users when using a personal computer.
The inventive material herein accommodates MFA combining device custody, with local PIN/password authentication, and biometric options.
The prior art discloses public key infrastructure (PKI) and digital certificates, an identity technology, introduced to automate the deployment of public-private encryption key pairs for secure communications, message transmission, and document safe-keeping. Digital certificates, conforming to the X.509 standard, include a public encryption key that is paired with a private key stored outside the context of the digital certificate. Tests can be performed to verify that a remote party holds the private key of a public key without having knowledge of the private key. PKI implements a hierarchical trust model wherein certificate authorities successively distribute digital certificates to dependent certificate authorities, Internet servers, and end-user devices. Digital certificates and their corresponding private keys are distributed by certificate authorities to other certificate authorities, to servers, and to end-user devices. Certificate authorities have the option of employing qualified human agents for 3rdparty identity proofing and verification.
The present invention improves upon the above features, overcoming the following deficiencies of PKI:
    • (a) Using qualified independent certificate authorities, effective for verifying and tracking the identity of service providers, does not scale for human beings who outnumber servers by orders of magnitude;
    • (b) Because public-private key pairs are generated by certificate authorities and subsequently distributed electronically, such key pairs could be vulnerable to compromise during distribution;
    • (c) Because X.509 digital certificates only specify the certificate holder by a common name or identifier, identities of persons cannot be specified comprehensively for commercial and other such applications;
    • (d) Digital certificates do not readily bind with other personal identifying information of an owner such as digital photographs or personal identifying information (e.g. passport, driver's license, certifications);
    • (e) Although digital certificates enable relying parties to verify that the digital certificate owner has the private key that matches the public key of a digital certificate, PKI does not incorporate personal identifying information that reliably distinguishes the certificate owner from other users;
    • (f) PKI does not provide assurances that the private key is strongly bound to the certificate owner;
    • (g) PKI does not incorporate identity proofing and binding capabilities that provide objective evidence to relying parties that an independent party has attested to the identity of the digital certificate holder;
    • (h) Because X.509 certificates are associated with a single public-private key pair, typically multi-purposed (e.g. used for digital signing, encryption, email, FTP, etc.), the risks of encryption key compromise are elevated over other approaches.
Finney et al discloses Pretty Good Privacy (PGP) which was introduced to automate the deployment of public-private key pairs among persons (peer-to-peer) to secure communication channels, transmitted messages, and documents among PGP users. In contrast to PKI, PGP implements a web of trust model wherein individuals issue digital certificates to each other. An end-user, having installed the PGP software on their personal computer, creates an X.509 digital certificate containing a single public key with matching private key stored on the user's computer. PGP enables an informal process whereby a first user can send such a certificate to a second PGP user who digitally signs and returns the certificate to the first user. By retaining the single private key of a digital certificate within the owner's computing device, PGP reduces the risk of exposing and compromising this private key. This approach for creating and sharing digital certificates can be replicated among users with PGP software on their computing devices. PGP users can present one or more signed digital certificates to relying parties (users), elevating identity assurances when presented to other parties.
The present invention improves upon the above features, overcoming the following deficiencies of PGP:
    • (a) Because X.509 digital certificates only specify the certificate holder by a common name or identifier, identities of persons cannot be specified comprehensively for commercial and other such applications;
    • (b) Digital certificates do not readily bind with other personal identifying information of an owner such as digital photographs or personal identifying information (e.g. passport, driver's license, certifications);
    • (c) Although digital certificates enable relying parties to verify that the digital certificate owner has the private key that matches the public key of a digital certificate, PGP does not incorporate personal identifying information that reliably distinguishes the certificate owner from other users;
    • (d) PGP does not provide assurances that the private key is strongly bound to the certificate owner;
    • (e) PGP does not incorporate a formal identity proofing process whereby relying parties are provided objective evidence of a user's identity;
    • (f) Because X.509 certificates are associated with a single public-private key pair, typically multi-purposed (e.g. used for digital signing, encryption, email, FTP, etc.), the risks of encryption key compromise are elevated over other approaches.
GLOSSARY OF RELEVANT TERMS
Identity: The present invention addresses only the identity of persons [i.e. human beings, individuals, users]. The identity of a person is comprised of selected characterizing attributes of the person that are attested to by one or more independent persons. The attributes of a person may include a combination of full legal name, commonly used names, pen names [pseudonyms], selected identifier(s), and various physical and non-physical attributes of the person. In the limit, the identity of a person is aggregated characterization of that person that distinguishes the person from all of other persons. In the future, DNA signatures could very well be used as identity attributes.
Identifiers: Identifiers are often confused with identity. An identifier, such as a social security number, a passport number, an email address or an employee number is an attribute of a person assigned by an agent of the government, a service provider, or an employer, and thereby contributes to a person's identity, but by itself does not constitute the person's identity.
Credential: A credential is a document held by a person that captures selected personal identifying information of the individual. A credential thereby partially represents the identity of the person. A person without any credentials or identifying documents has no documented identity and must rely on the attestations of other persons. An adult holding only a birth certificate, and no other credentials, would find it very difficult to conduct most day-to-day transactions. The attributes of a person are generally captured and specified by several credentials. The conjunction of all credentials held by a given person represents the total documented identity of the person. It is impractical and ill-advised to capture all of the attributes of a person in a single credential since disclosure or loss of such a comprehensive credential would compromise the entire identity of the person.
Credentialing: Credentialing is a process by which credentials, whether physical or electronic, are issued to individual persons. A person presents a credential to other persons when asserting their identity or presenting selected attributes of a credential. Credentialing is also known as identity provisioning.
Physical Credentials: Passports and driver's licenses are the most widely accepted physical credentials used to verify a given person's identity. A driver's license is an example of a physical card that specifies the holder's name, allocated license number, address, birthday, issue date, expiry date, and photograph. Issued by a state Departments of Motor Vehicles (DMV), such a physical credential also displays the issuer's jurisdiction plus watermarks and other technologies designed to detect and prevent credential tampering. Table 1 categorizes physical credentials in common use.
Anti-fraud and Anti-copying: Ancient measures for protecting against fraud and tampering can be traced back to the use of wax seals and steganography. Wax seals were applied by monarchs to protect sensitive messages and official decrees. Equivalent techniques are still used by professional engineers, architects and notaries to seal drawings, physical credentials and other documents. The notary's process of applying seals to documents by means of an embossing device has been adapted to suit the needs of this invention.
Certified True Copies: To create a certified true copy of a physical credential such as a driver's license, a notary “proofs” a photocopy asserted to be a true copy of the driver's license by comparing the photocopy to the original driver's license, and verifying that they both match the person requesting the true copy. If satisfied, the notary applies a “true copy” declaration to the photocopy, and then uses an embosser to apply the notary's seal to the document. The applied seal identifies the notary, prevents others from tampering with the certified true copy including the “true copy” declaration, and thereby binds the notary's identity to the identity of the person specified in the copy. In prescribed circumstances, the certified true copy of an original driver's license can be used in lieu of the original for identification purposes, that is, the true copy is, in effect, a bona fide credential. Similarly, certified true copy translations (e.g. Spanish to English), and certified true copy photographs, can be proofed and sealed by a notary or a certified profession, for example, to support a person's application for a passport.
Physical Credentialing: Physical credentials have been generally issued by organizations, including governments, corporations, and financial institutions possessing the infrastructures and funding to issue fraud-resistant physical credentials. Smaller organizations including clubs, non-profits, affiliates, loyalty groups, and societies also issue physical credentials, albeit in simpler forms. In the final analysis, physical credential processing, including proofing and issuance, is performed by agents (individuals) who have been assigned to follow prescribed procedures of an identity provisioning institution. Credential proofing and issuing is, possibly, the most labor-intensive aspect of traditional physical credentialing systems.
Electronic Credentials: Electronic credentials, in the context of this inventive subject matter, are the digital equivalents of physical credentials. Electronic credentials are the electronic equivalents of passports, driver's licenses, banking cards, business cards, and all other such physical credentials (see Table 1), capturing and storing the names, identifiers, attributes, and photographs of individuals in software and electronic devices. Plastic credit and debit cards that capture the holder's name, an identifier, an expiry date, and possibly a photograph of the person within a magnetic strip or chip in the card (smart cards) are also are examples of electronic credentials. Software-based identities, “virtual identity cards”, and “electronic wallets” deployed on personal computers and in the “cloud” are also available. Relevant credentialing terms include:
Electronic Credentialing: Electronic credentialing is a process by which a credential issuer, an individual or an organization, collaborates with users to request, proof, and provision electronic credentials (e-credentials) to individuals. The requester submits a request for a new e-credential to the issuer; the issuer proofs the provided documents; and, when satisfied, issues an e-credential to the requester.
In-Person and Online E-Credentialing: Depending on the associated risks and the required level of identity and credential assurances, credentialing may involve a blend of in-person proofing and online proofing. In-person encounters will be appropriate to support large-value high-risk transaction flows. However, in-person encounters can be labor-intensive, less convenient, and less timely. Online proofing can be accomplished using audio and teleconferencing tools once a mutually trusted communications channel is established between the parties. The exposure risk of online identity proofing can be mitigated deploying multi-factor authentication between the user the system and using out-of-band techniques to exchange shared secrets.
Electronic Credential Issuing Modes: An e-credential is issued by at least one person, possibly even the credential holder themselves (a “self-issued” credential); by one or more independent issuers without relevant qualifications; by issuers who have personally known the requester for a given number of years; by issuers with ethical obligations levied by their professional oversight body; by issuers who occupy professions with specific relevant obligations to inspect and certify identifying documents with oversight; and by issuers with directly relevant qualifications and oversight to issue credentials of the type requested.
Assurances: For an electronic credentialing system to be effective it must be trusted to attest to identifying information, capture the information in the form of electronic credentials, and securely maintain and make credentials available for identity maintenance and verification throughout the useful lifetime of the credentials and the system itself. The levels of trust provided by such a system is dependent on the combination engineering tasks applied to achieve correctness, integrity, reliability, security, and quality of the system, its artifacts, and methods.
Identity Assurance: When communicating with a remotely located persons or services, collaborating parties need assurances as to the true identity of the parties. To support this requirement for persons [web services are beyond scope], the identifiers and attributes of a person (a subject), including legal, common, and pseudonyms, must be independently verified by independent persons known as issuers. The level of identity assurances achieved by the issuer depends on the extent the subject is known by the issuer (familiarity), and the relevant vetting and proofing competencies of the issuer. Relevant competencies for an issuer include proofing and vetting skills, objectivity, questioning skills, professional oversight by a governing body, and applicable code of conduct possibly sworn by oath—notary publics are exemplars. Identity assurances increase as the number of years that an issuer has personally known a subject, though not necessarily linearly. Identity assurance levels are also proportional to the above listed range of vetting and proofing competencies. Because objectivity and independence may conflict with familiarity, certain professionals, such as notaries and agents of credential issuing organizations, may be obliged to decline proofing and vetting a person who is too closely related to the issuer by way of family and employment.
Communications Assurance: The quality of communications when an issuer proofs the identity of a subject user has a significant impact on the efficacy of a credentialing system. Elevated levels of communications assurance can be achieved when the subject and issuer hold an in-person (face-to-face) encounter to exchange physical credentials and proof personally identifying documents. When a face-to-face encounter is not possible, identity proofing can be protected by establishing a mutually trusted communications channel between the parties using a shared secret exchanged out-of-band (over an alternate channel). For example, a shared pass-phrase could be exchanged over the telephone and a password-based scheme [2] generating a shared encryption key can be used to establish an encrypted session between the parties.
Credential Assurance: Credential assurance is directly dependent on identity assurance (familiarity and qualifications) and on the communication assurance (in-person encounters and trusted communication channels). However, credential assurance is separately proportional to the number of independent issuers proofing and attesting to a given credential. In other words, multiple proofing by independent issuers increases the level of credential assurance achieved. In addition, the relative binding strength between a credential issuer and a user receiving a credential elevates credential assurances. An issuer who is strongly bound to an issued credential will be challenged to repudiate having issued a credential to the subject and will therefore be proportionately motivated to thoroughly proof the identity of the subject. By the same token, relying parties, knowing that the issuer is strongly bound to credentials they issue, will be proportionately assured as to the relative assurance level of the subject's credential.
Authentication Assurance: Authentication assurances elevate the strength of bindings between a user and the local and remote services they use. Higher assurance levels for local authentication are achieved by employing multiple factors of authentication. Authentication factors include physical custody of the user's computing device plus knowledge-based, biometric-based and behavioral-based authentication schemes. Trustworthy remote authentication between a user's computing device and a remote server is generally accomplished by means of public-private keys derived from the user's locally stored credentials.
Software Assurance: The critical software components of an electronic credentialing system must be highly trusted and must also be protect by the operating system against malware, hacking and other attacks attempting to tamper-with, circumvent, or block the logic of the electronic credentialing system. Software assurance levels rise in proportion to the trustworthiness of the execution environment and the quality of the development effort (quality engineering, assurance, analysis, and testing). For example, a trusted execution environment capable of creating a “trust zone” within which the credentialing software executes will elevate software assurances.
Asymmetric key Encryption: Also known as public-private key encryption, algorithms that use two keys, a widely known public key and a private key known only to the owner. For example, the public key can be used to encrypt text that can only be decrypted by the paired private key. Alternately, the private key can be used to create a digital signature that can only be verified by the public key. RSA and Elliptical Curve (EC) are among the best known asymmetric key algorithms.
Authentication: User authentication is a security mechanism for binding a user to a controlled resource by validating the identity of the user, for example, through a logon process (e.g. account/PIN, and identifier/password pairs), and/or through a biometric matching process. Message authentication is a process for establishing the validity of a transmission, for example, through a cryptographically generated message authentication code attached to the message. Message origination authentication can be performed by using a private key of the originator to create a digital signature over the message which is verified by the recipient using the paired public key.
Biometric Minutia: In biometrics and forensic science, minutiae are enrolled features of a biometric, for example, a fingerprint scan, an iris scan, and a facial scan, that are used to algorithmically match future scans of an individual's biometric to authenticate the individual.
Cryptography/Encryption: A discipline of mathematics and computer science concerned with information security including algorithms that translate data and text into secret code strings known a cipher text.
Cryptographic: An adjective used to characterize encryption, digital signing, and digital sealing processes.
Crypto-logical Binding: Coined herein to characterize the binding between pairs of public-private keys wherein encryption by one key yields a result that can only be decrypted by the other key.
Digital Sealing: A cryptographic method defined herein that uses a private key of the issuer to bind the issuer's identity and a declaration of the issuer to a document or message such that the issuer cannot repudiate having applied the digital seal. The paired public key can be used to verify the digital seal.
Identity Binding: As used herein, binding an individual to their identity by way of custody of a device or devices (personal identity device and removable protected memory), user authentication to the user's device (control of authentication data), logical binding to the user's identity (identity engine encapsulating e-credentials of owner), and third party attestation by way of identity proofing and digital sealing of a declaration that cannot be repudiated.
Information Security: The protection of information to ensure confidentiality, integrity, and availability.
Issuer (payment card definition): An entity that issues payment cards or performs, facilitates, or supports issuing services including but not limited to issuing banks and issuing processors.
Hashing: a one-way mathematical function in which a non-secret algorithm takes any arbitrary length message as input and produces a fixed length output usually called a “message digest”.
Non-Repudiation: A state of affairs where a purported declaration by an individual cannot be successfully challenged, for example, when the authenticity of a signature applied to a contract is challenged.
PIN: Personal Identification Number.
Protected Memory Store: A memory that is, or can be, isolated from the primary working memory of a device such that this memory can only be accessed by a designated module (e.g. the “identity engine” herein).
Multifactor Authentication (MFA): Typically characterized by authentication factors based on (a) “what you know”, (b) “what you have” and (c) “what you are”, where factor (c) can be a biometric authentication factor or a behavioral authentication factor. Geo-location is also considered an authentication factor in certain contexts.
Out-Of-Band (OOB): A parallel channel to the primary information access channel. For example, when the primary session is a web session to a service provider, text messaging, voice, courier, and fax communications are considered out-of-band.
Personal Identifying Information (a.k.a. Personally Identifying Information): Information that can be utilized to identify or trace an individual's identity including but not limited to name, address, social security number, biometric data, date of birth, etc.
Sniffing: A technique that passively monitors messages over networks and channels for the purpose of collecting sensitive user information and intelligence including user accounts and passwords.
Symmetric Key Encryption: Algorithms that use the same encryption key to both encrypt and decrypt text and data (e.g. AES).
User Persistence: A condition that can be verified by performing a test that verifies that the same user is present (i.e. “is using”) at a remotely located device wherein the identity of the remote user need not be known.
SUMMARY
A novel system of electronic artifacts and methods for specifying, issuing, and using electronic identities is described. This system mimics physical credentialing systems, the aim being to offer an elevated assurance identity solution that will be readily adopted by citizens, consumers and enterprise users. The present invention overcomes the shortcomings of traditional password-based and digital certificate based identity systems.
The present invention specifies a system for individual persons, as well as agents associated with identity services, to issue identities to other persons such that these identities can be employed by their owners to unambiguously identify themselves over information networks.
Synopsis
The present invention provides strong assurances to a relying party, namely to a user or to a service, that the collaborating remote user is strongly bound to their personal identity device and identities contained therein and thereby persistently present; that the identity presented by the collaborating remote user originated from that user, and no other user; that the identity presented by the remote user was attested to by at least one 3rdparty user; that such 3rdparty users cannot repudiate having attested to the identity provided to the remote user; that by means of the identity provided by the remote user, information sent to the remote party can only be read by that remote party, and no other parties; and that by means of the identity provided by the remote party, the relying party can verify that information received from the remote user, must have originated from that user, and no other user.
Unanticipated Discovery: By means of the identity of a user and a digital sealing method, a notarization-like procedure, the user can digitally seal a declaration to an electronic document, including an electronic identity, such that the user cannot repudiate having applied the digital seal to the declaration and the document.
Utility
The present invention specifies identity artifacts and methods that can be applied to adapt prior art personally held devices including smart phones, tablet PCs, laptops and personal computers for the purpose of identity acquisition, holding, issuance and usage. The sections below systematically explain how the new artifacts and methods of this innovation have been combined with prior art technologies to yield a new approach for electronic identity and credentialing. Context, practical pre-conditions, and relevant assumptions are also articulated. An ordinary person skilled in the art could not have discovered the inventive material through traditional design effort or happenstance.
Herein, an identity of a user is specified in the form of an electronic credential (e-credential) containing fragments of the e-credential owner's personal identifying information.
This innovation specifically avoids the weaknesses of remote password/PIN based authentication schemes wherein such user secrets are vulnerable to being discovered and “cracked”. It also offers a solution that avoids the risks of e-credentials being stolen from network repositories for fraudulent purposes.
The present invention overcomes these weaknesses and risks, creating an identity system where:
    • (A) E-credentials of the owner can only be used by that owner to perform privileged operations, and
    • (B) An owner's e-credential cannot be employed by other users to masquerade as the e-credential owner.
By way of this invention, users control their e-credentials and secrets, acquire identities from one another, and use their e-credentials and associated secrets to enable secure information access and sharing with other users and information services:
    • (i) Messages originated under the e-credential of an owner cannot be repudiated by that owner;
    • (ii) Messages received under the e-credential of the owner can only be read by that owner
    • (iii) Documents digitally sealed under the e-credential of the owner cannot be repudiated by that owner.
      New Artifacts and Methods Combined with Prior Art
The present invention leverages identified prior art, combining selected features with new artifacts and methods.
This invention leverages prior art authentication schemes. It is assumed that the personal identity device of the user (the owner) has pre-installed authentication hardware and software mechanisms executing local PIN/password, biometric and/or other authentication schemes wherein authentication data (e.g. PIN/password hashes and finger print, iris, and facial recognition minutia) are retained within the personal identity device. Authentication factors, possibly combined (i.e. multi-factor authentication schemes), thereby persistently bind the user to their personal identity device and the e-credentials (identities) contained therein.
This innovation also leverages prior art public-private encryption key technology which enables a remote party to verify that an e-credential provided by an owner is in the custody (possession) of that owner. Public-private encryption technology associated with a selected e-credential is also used to perform digital signing, encryption and digital sealing operations that are bound to the e-credential owner by means of prior art public-private encryption technology.
The present invention introduces a novel method called “digital sealing” which adapts prior art digital signing technology. A digital seal applied under an e-credential of an owner, cryptographically binds a declaration of the owner to a selected document such that the owner cannot repudiate having applied the declaration to the document.
How the Present Invention Overcomes Limitations of Legacy Identity Systems
Specific limitations of legacy identity systems are overcome by:
    • (a) Enabling the owner of a personal identity device to use that device to hold identities that are comprehensively specified in the form of electronic credentials (“e-credentials”);
    • (b) Leveraging pre-installed authentication mechanisms and related authentication data to persistently bind the device owner to e-credentials and secrets of the owner contained therein;
    • (c) Binding public-private keys to e-credentials of an owner to enable remote users to verify that an e-credential provided by the originating owner is in the owner's possession, and that subsequent digital signing, encryption, and digital sealing operations are bound to that owner;
    • (d) Specifying an identity proofing, attestation and digital sealing procedure whereby an e-credential issuer (a user) collaborating with an e-credential requester (another user), binds personal identifying information of the requester to an e-credential of the requester such that the issuer cannot repudiate having attested to the requester's identity specified by that e-credential.
    • (e) Enabling multiple users to proof, attest to, digitally seal, and issue a given e-credential thereby elevating identity assurances for relying parties who can inspect and verify at least one, and possibly all, digital seals applied to the e-credential of the owner.
    • (f) Enabling relying parties to inspect the e-credentials of each user having applied a digital seal, including the e-credentials of any, and possibly all, antecedent users having applied a digital seal, to achieve elevated assurances for high value transactions.
These capabilities combine to provide elevated assurances to collaborating parties that the remote party is persistently bound to any e-credential they provide, that the parties are thereby strongly bound to each other over persistent, secure communications channels, and that the provided e-credential unambiguously contains selected identifying information of the collaborating remote party.
Assumptions and Pre-Conditions
The present invention assumes users have prior art smart phones, tablet PCs, laptops, and other such personal computing devices, that these devices have user interface(s), communications interfaces (e.g. Internet, cellular, NFC, Bluetooth), a native operating system, an authentication component, likely digital camera(s), possibly built-in hardware and/or software cryptographic libraries, and possibly a removable protected memory store such as an SD card, USB flash memory, or a smart card. The authentication component may support multiple user authentication mechanisms. It is assumed that the operating system is capable of preventing, detecting, and quarantining malware and remote hacking attempts thereby isolating the artifacts and methods of the present invention from active and passive tampering. Finally, it is assumed that the user's device and software may have pre-determined identifiers and that the artifacts and methods of this invention are pre-installed.
Novel Distinguishing Features
The key artifacts of the present invention include personal identity devices of users (owners), each device having an identity engine for holding and managing electronic identities and secrets of the device owner as well as the identities of other device users. The identity engine specifies electronic identities of the device owner by capturing selected identifying information of the user which the identity engine embeds into newly created “electronic credentials” (e-credentials) encapsulated by the identity engine. The user's identifying information is captured by means of user interface(s) including digital camera(s) if present. The camera(s) can be used, for example, to take self photographs, and photographs of the other identifying information of the user (e.g. certificates, licenses, driver's license). The identity engine captures the e-credentials of others users by requesting them from collaborating users over information networks and/or by acquiring them from remote identity repositories.
Secrets of a device owner such as authentication data (e.g. PIN/password hashes, biometric templates, and behavioral criteria), and private encryption keys, are retained in a protected memory store such that the secrets can only be accessed and used by the identity engine and are not disclosed by the identity engine. When such a protected memory store is physically removable from the owner's device, and can be re-attached, it is called an “ignition key”.
Combining Distinguishing Features Yields Remarkable Capabilities
The distinguishing features of the present invention are combined to yield the following remarkable capabilities:
  • (a) The identity engine of the owner's personal identity device controls a protected memory store containing the owner's authentication data. Once authenticated, the user is thereby persistently bound to the identity engine including contained e-credentials and three (3) public-private keys associated with each e-credential. The private keys are also maintained within the protected memory store. If the protected memory store is removable, the identity engine can be disabled by removing the memory restore.
By way of (a), e-credentials maintained within the identity engine of an owner's device can be exchanged and used to establish persistent, secure sessions between collaborating users. Using their respective e-credentials and associated public-private key pairs, e-credential owners can exchange messages that have been digitally signed by the sender and encrypted for the recipient. Owners can also use their e-credentials and associated keys to digitally seal and inspect (verify) documents and messages. Although these mechanisms ensure that owners are strongly bound to their e-credentials, collaborating users cannot be certain that the identifying information embedded in the e-credential provided by the other party actually represents the identity of the other user (User masquerade is possible in the absence of 3rdparty proofing and attestation of an e-credential).
  • (b) Having established a persistent, secure session by way of (b), one user (the issuer) can proof and attest to the identity of another user (the requester), digitally seal the requester's e-credential, issue the credential to the requester, and thereby provide the requester with an attested to e-credential that the issuer cannot repudiate. Such a requesting user can subsequently use such digitally sealed e-credentials to provide elevated identity assurances to other parties. Such proofed and attested to e-credentials can also be used to affix digital seals, including declarations (A digital seal applied to an electronic document without a declaration only confirms that the user applying the digital seal is aware if the existence of the document), to electronic documents, including e-credentials and message, that cannot be repudiated by a user applying a digital seal.
In summary, the present invention yields the following remarkable capabilities: Collaborating parties are provided assurances that a personal identity device owner is persistently bound to their device including the digitally sealed and issued e-credentials of the owner and the associated encryption keys; that an e-credential, proofed, attested to, and digitally sealed by a personal identity device owner to another user, cannot be repudiated by that owner; that the originator of messages and documents under the originator's e-credential cannot repudiate having sent them; that the user owning a given credential will be the sole party capable of receiving messages employing that e-credential; and that a personal identity device owner applying one of their e-credentials to digitally seal an electronic document or message, possibly including a declaration of the owner, cannot repudiate having applied their digital seal and declaration to the document or message.
Summary of Benefits
This electronic identity and credentialing system prevents a wide-range of electronic fraud vulnerabilities, mitigating the risks of identity theft, loss and abuse. The system has been created to support the needs of individual persons to control their identities as well as the needs of enterprises to unambiguously identify consumers, employees, citizens, and other users.
This invention specifically satisfies the compelling need for an electronic identity and credentialing system that mimics traditional identities and credentialing in the physical world, and avoids the vulnerabilities and risks of legacy identity systems. The present invention achieves this objective, creating high assurance identities for and among individual persons in the form of electronic credentials (e-credentials) bound to e-credential holders.
This electronic identity and credentialing system, by means of an identity engine operable within a personal identity device, strongly binds identifying information of the individual to their electronic credentials which they can subsequently use to unambiguously represent themselves to others over information networks while using their smart phone, tablet computer, laptop computer, or personal computer.
Contemplated embodiments described herein integrate smart cards, smart rings, smart watches and smart glasses to elevate identity assurances for citizens and consumers as such enabling technologies emerge.
DRAWING REFERENCE NUMERALS
  • 000 electronic identity and credentialing system
  • 101 users with personal identity devices
  • 102 smart phone
  • 103 tablet computer
  • 104 laptop computer
  • 105 service providers
  • 106 identity services
  • 107 transactions between users and service providers
  • 108 transactions between users and identity providers
  • 109 e-credential requesting user (a requester)
  • 110 personal identifying information
  • 111 e-credential request
  • 112 e-credential issuing user (an issuer)
  • 113 issued e-credential
  • 114 mutually trusted channel
  • 115 if agent, sends e-credential copy to identity provider
  • 116 identity service
  • 120 personal computer
  • 200 personal identity device and identity bindings
  • 201 owner (a user)
  • 202 personal identity device
  • 203 personal identifying information in custody of owner
  • 204 identity engine
  • 205 custody of device in custody of owner201
  • 206 user interface
  • 207 camera
  • 208 photographing owner
  • 209 photographing personal identifying information
  • 210 knowledge-based binding (e.g. password, PIN)
  • 211 biometric module
  • 212 personal identifying information in custody of owner201
  • 213 protected memory store (ignition key)
  • 214 custody of ignition key (removable protected memory store)
  • 215 biometric binding
  • 216 logical binding betweenuser interface206 andauthentication data226
  • 217 logical binding betweenbiometric module211 andauthentication data226
  • 218 crypto-logical bindings between public and private keys associated with e-credentials ofowner220
  • 219 authentication control
  • 220 e-credentials of the owner
  • 225 public keys embedded in e-credentials of owner
  • 226 authentication data
  • 227 private keys of e-credential ofowner220
  • 230 e-credentials of other users
  • 235 public keys embedded in e-credentials of other users
  • 240 communications interface
  • 245 documents and messages in a personal identity device
  • 260 device identifier
  • 265 identity engine identifier
  • 270 legend: identity bindings
  • 275 legend: public-private encryption keys
  • 290 other users (issuers) with e-credentials
  • 291 digital seals affixed to e-credentials by other users
  • 292 digital seal affixed to a document by another user
  • 293 cryptographic bindings between issuers290 and e-credentials ofowner220 and a document
  • 245 by way of digital seals
  • 294 digital seals affixed to e-credentials of other users
  • 295 digital seal applied to a document using an e-credential of theowner220
  • 296 cryptographic binding by way of a digital seal affixed to a document using an e-credential of theowner220
  • 300 collaboration among users with personal identity devices
  • 301 user (requester)
  • 302 user (issuer)
  • 303 user has an e-credential issued by another party
  • 390 collaborating users can establish persistent secure sessions by exchanging e-credentials and using the encryption key pairs associated with their e-credentials
  • 392 anissuer302 attests to the identity of a requester301 wherein the issuer cannot repudiate having proofed the requester's identity
  • 394 users can use e-credentials proofed and attested to by other parties to establish secure sessions—user301 provides user303 an e-credential issued byuser302, while user303 providesuser301 an e-credential issued by a different party
  • 400 electronic credentials and relationships
  • 401 e-credential of an owner (a user)
  • 402 default e-credential
  • 403 e-credentials of issuers
  • 404 e-credentials of other users
  • 405 personal identifying information
  • 406 digital seals created using e-credentials of issuers
  • 407 digital seals affixed to e-credential401
  • 408 e-credential ofowner401 used to issue e-credentials to other users
  • 409 digital seals affixed to e-credentials of other users
  • 410 self-sealed default e-credential
  • 411 e-credential attributes
  • 412 owner attributes of the e-credential owner
  • 413 each digital seal associated with e-credential issuing record
  • 414 e-credential issuing record
  • 423 digital sealing image
  • 416 three (s) public-private encryption key pairs
  • 417 public keys (3) embedded intoe-credential401
  • 418 private keys (3) in protectedmemory store213
  • 440 attributes of e-credential attested by issuer
  • 441 attributes of e-credential conferred by issuer
  • 442 sign/verify documents and messages
  • 443 encrypt/decrypt documents and messages
  • 444 embossing key used to create digital seals
  • 445 inspection key used to verify digital seals
  • 450 credential template (an empty unsealed electronic credential)
  • 500 digital sealing and digital seal inspection methods
  • 501 an electronic artifact (e.g. document, message, e-credential)
  • 510 declaration of the user affixing digital seal
  • 517 e-credential identifier
  • 519 digital sealing method
  • 520 digital seal inspection method
  • 521 e-credential of user creating and applying a digital seal
  • 522 pre-determined attributes ofe-credential521
  • 523 digital sealing image
  • 524 inspection key (i)
  • 526 predetermined elements of electronic artifact
  • 528 digital seal
  • 530 hash method
  • 531 (message) digest
  • 532 emboss method
  • 533 digital seal signature
  • 534 render method
  • 540 extract method
  • 541 inspect method
  • 542 hash method
  • 543 compare method
  • 544 result
  • 545 result
  • 546 “digital seal verified”
  • 547 “digital seal failed to verify”
  • 600 issuing true copy e-credential of a physical credential
  • 601 e-credential requester
  • 602 requester takes a photograph of a physical credential
  • 603 photograph of physical credential
  • 604 physical credential
  • 605 e-credential request
  • 606 mutually trusted channel established
  • 607 e-credential issuer
  • 608 identity proofing
  • 609 true copy e-credential
  • 610 transaction record
  • 611 e-credential registry
  • 700 issuing true copy self photograph e-credential
  • 701 e-credential requester
  • 702 requester takes self photograph
  • 703 e-credential request
  • 704 self photograph
  • 705 mutually trusted channel established
  • 706 e-credential issuer
  • 707 identity proofing
  • 709 true copy self photograph e-credential
  • 710 transaction record
  • 711 e-credential registry
  • 800 issuing an original e-credential
  • 801 e-credential requester
  • 802 e-credential request
  • 803 mutually trusted channel established
  • 804 e-credential issuer
  • 805 identity proofing
  • 806 physical credentials
  • 807 e-credential registry
  • 808 digital photograph
  • 809 issued e-credential
  • 811 transaction record
  • 900 alternate embodiments
  • 901 smart phone
  • 902 tablet computer
  • 903 laptop computer
  • 904 personal computer
  • 905 smart card
  • 906 smart ring
  • 907 smart watch
  • 908 smart glasses
  • 909 e-credentials of the user including public keys
  • 910 mutually trusted channel established
  • 911 protected memory store
  • 912 private keys and secrets
  • 920 user
  • 1000 potential scope of electronic credential usage
  • 1001 user holding a personal identity device
  • 1002 representative e-credential issuing users holding personal identity devices
  • 1003 true copy photograph
  • 1004 true copy driver's license
  • 1005 diploma
  • 1006 employee identifier
  • 1007 driver's license
  • 1008 social security number
  • 1009 citizenship
  • 1010 passport
  • 1011 healthcare card
  • 1012 debit card
  • 1013 credit card
  • 1020 friend, family member, colleague, co-worker
  • 1021 professional network, social network, professional affiliation, non-profit association
  • 1022 notary public, teacher, professor, physician, dentist, certified professional
  • 1023 educational institutions
  • 1024 employers, enterprises, businesses
  • 1025 departments of motor vehicles
  • 1026 federal and state institutions
  • 1027 financial institutions and banks
  • 1028 healthcare providers and insurers
  • 1029 e-business merchants and suppliers
  • 1100 relating physical credentialing, PKI, PGP and e-credentialing system
  • 11A: Physical Credentialing
  • 1101 identifying attributes
  • 1102 physical credentials
  • 1103 other personal identifying information
  • 1104 user
  • 1105 physical credential
  • 1106 agents
  • 1107 credential request
  • 1108 agent issues physical credential
  • 1109 writes credential and transaction record
  • 1110 credential registry
  • 11B: Public Key Infrastructure (PKI)
  • 1120 certificate authority (C)
  • 1121 signed [digital] certificate, name=C
  • 1122 root certificate authority
  • 1123 certificate request
  • 1124 user X
  • 1125 signed digital certificate, name=X
  • 1126 signed digital certificate issued
  • 11C: Pretty Good Privacy (PGP)
  • 1140 user A
  • 1141 user B
  • 1142 unsigned digital certificate, name=A (associated with private key)
  • 1143 unsigned digital certificate, name=B (associated with private key)
  • 1144 unsigned digital certificate, name=A (disassociated from private key)
  • 1145 signed digital certificate, name=A
  • 1146 private key associated with public key of signed certificate
  • 1147 signed digital certificate, name=A (associated with private key
  • 11D: Electronic Identity and Credentialing System
  • 1160 user A
  • 1161 user B
  • 1162 user C
  • 1163 personal identity device
  • 1164 personal identity device
  • 1165 personal identity device
  • 1166 first step of round-robin issuing process
  • 1167 second step of round-robin issuing process
  • 1168 third step of round-robin issuing process
  • 1169 default credential, name=default
  • 1170 e-credential request, name=A (associated with private keys)
  • 1171 default e-credential embossing key digitally seals request
  • 1172 e-credential request, name=A (disassociated from private keys which are thereby not revealed)
  • 1173 sealed e-credential, name=A (sealed by user A and user B)
  • 1174 newly issued e-credential
  • 1175 digital seal of user B applied
  • 1176 digital seal of user C applied
  • 1177 embossing key of selected credential digitally seals issued e-credential (e.g. default e-credential)
BRIEF DESCRIPTION OF DRAWINGS
The following figures show embodiments according to the inventive subject matter, unless noted as showing prior art.
FIG. 1 is a system diagram depicting users holding personal identity devices, communicating with identity services and service providers, and relationships between users, personal identifying information, and electronic credentials.
FIG. 2 is a diagram depicting an owner's personal identity device including personal identifying information, pre-installed identity engine, e-credentials retained within the identity engine, a protected memory store, known as an ignition key if removable, other users of personal identity devices, identity services, service providers, and various physical, knowledge-based, biometric, logical, and crypto-logical bindings among the artifacts comprising a personal identity device, as well as bindings with other users of personal identity devices.
FIG. 3 is a diagram depicting collaboration among users requesting, issuing, holding and using e-credentials.
FIG. 4 is a diagram depicting electronic credentials of users (e-credential owners), including attached personal identifying information, a default e-credential, and an e-credential template, the figure also depicting relationships between e-credentials of issuers and an e-credential owner, and e-credentials issued by an e-credential owner to other users of personal identity devices.
FIG. 5 is a diagram depicting a digital sealing method that can be employed by a user to apply a digital seal to an e-credential, document or message, and to inspect a digital seal to verify the identity of the user having applied the digital seal to the e-credential, document or message.
FIG. 6 is a usage scenario diagram illustrating the creating of an e-credential with an attached photocopy of the physical credential thereby issuing of a true copy of a physical credential.
FIG. 7 is a usage scenario diagram illustrating the creating of an e-credential with an attached self photograph, thereby issuing of a true copy of a self photograph, and possibly creating an electronic business card1.
FIG. 8 is a usage scenario diagram illustrating the issuing of an original electronic credential, for example, an electronic driver's license or banking card embedded in the user's personal identity device.
FIG. 9 depicts alternate embodiments of the electronic credentialing system that can be expected to emerge in the future.
FIG. 10 depicts the potential scope of applications and services that could benefit from deployments of the electronic identity and credentialing system in various economic sectors.
FIG. 11 relates physical credentialing, Public Key Infrastructure, Pretty Good Privacy (PGP), to the electronic identity and credentialing system.
DETAILED DESCRIPTION OF THE INVENTION
Persons skilled in the art will recognize that many modifications and variations are possible in the details, materials, and arrangements of the parts and actions which have been described and illustrated in order to explain the nature of this inventive concept and that such modifications and variations do not depart from the spirit and scope of the teachings and claims contained therein.
All patent and non-patent literature cited herein is hereby incorporated by references in its entirety for all purposes.
Representative embodiments according to the inventive subject matter are shown inFIGS. 1 to 11, wherein similar features share common reference numerals. The specific embodiments are meant to be illustrative and not limit the scope of the invention and the various ways it may be embodied.
The inventive subject matter is an electronic credentialing system which includes personal identity devices of users [persons] capable of requesting and issuing electronic credentials, as well as exchanging electronic credentials over the web with identity services and service providers. A personal identity device is an adapted mobile computing device such as a smart phone, a tablet computer, a laptop computer, or personal computer with a pre-installed identity engine and a protected memory store. Users have physical credentials in their custody, and electronic credentials (e-credentials) maintained within the identity engine of their personal identity device(s). The protected memory store contains secrets including PINs, passwords, and passphrases of the device owner. An embodiment of a personal identity device could include a trusted execution environment to establish a trust zone to shield the identity engine and protected memory store from un-trusted software components.
A requesting user can submit an e-credential request to another user, the issuer, who proofs personal identifying information provided by the requester, digitally seals the e-credential including a declaration of the issuer, and returns the digitally sealed e-credential to the requester. Acquiring an attested to e-credential requires a requester to arrange an encounter [a session or meeting], or possibly a series of encounters, with issuer(s) to vet the requester by proofing their personal identifying information, for example, by matching the requester to the photograph and signature on their driver's license, and by asking probing questions to ferret out imposters. An in-person encounter is said to be one where the identity of the requester is proofed by the issuer face-to-face, typically in a private area. Online identity proofing can be conducted, for example, by way of audio-video conferencing (e.g. Skype) or telephone, wherein personal identifying information is submitted electronically. Online identity proofing appears to be more vulnerable to electronic fraud than in-person proofing. However, this disadvantage is mitigated when the requester is well-known by the issuer and the online encounter is conducted over a mutually trusted communications channel.
During operational use, users of personal identity devices can use them to collaborate with other device users as well as with identity services and service providers. E-credentials obtained from other users are retained by the identity engines.
Now referring toFIG. 1 which depicts the electronic identity andcredentialing system100 including users with personal identity devices101 includingsmart phones102,tablet computers103,laptop computers104, andpersonal computers120.FIG. 1 also depictsservice providers105 andidentity services106, transaction flows between users andservice providers107, and transactions between users andidentity services108. Additionally, the figure illustrates an e-credential (electronic credential) requesting user109 (a requester), holding personal identifyinginformation110, submitting an e-credential request111 to an e-credential issuing user112 (an issuer), who issues an e-credential113 to the requester109 by way of theirsmart phones102. If the issuer is an agent of anidentity service116, the issuing agent sends acopy115 of the issuedelectronic credential113 toidentity service116.
Now referring toFIG. 2, this diagram depicts a personal identity device andidentity bindings200 composing the system.Legend270 ofFIG. 2 depicts five (5) types of bindings: physical, knowledge-based, biometric, logical, and cryptographic (crypto-logical) bindings. The identity bindings among artifacts of the system provide assurances that e-credentials of the owner are strongly bound to the identity owner, and not to any other owner.
FIG. 2 depicts an owner201 (a user),personal identity device202 of the owner, personal identifying information203 (e.g. utility bills, certificates, driver's licenses) in thecustody212 of owner201, and communications interface240 to other users with personal identity devices101, toremote identity services106, and toremote service providers105.Personal identity device202 is bound to the device owner201 by way ofphysical custody205 andauthentication bindings210 and215 protecting against possible loss ofcustody205. Apersonal identity device202 also contains documents andmessages245. This figure additionally shows other users (issuers)290 with e-credentials having affixeddigital seals291 to e-credentials220 of the owner anddigital seal292 affixed to a document ormessage245.
Apersonal identity device202 has anidentity engine204 that holds e-credentials (electronic credentials) of theowner220 and e-credentials ofother users230.Identity engine204 controls a protectedmemory store213 and possibly has adigital camera207.Identity engine204 specifies an e-credential of theowner220 specified by owner201 entering personal identifyinginformation203 captured210 by way ofuser interface206, by attaching self-photographs208, and by attachingphotographs209 of the owner's personal identifyinginformation203. Certain embodiments may have a device identifier260 (Adevice identifier260 can be used to remotely identify a given personal identity device if revealed) and an identity engine identifier265 (An identity engine identifier can be used to reveal characteristics of the identity engine, for example, the software license number, software release/version, last update date, and configuration data).
User interface206 is also capable of performing knowledge-based authentication and storing knowledge-basedauthentication data226, including PINs, passwords and PIN/password hashes, in the protectedmemory store213. Thepersonal identity device202 possibly has abiometric module211 performing biometric authentication, storingbiometric authentication data226, including finger print, iris, facial and other biometric minutia, in protectedmemory store213.Authentication data226 stored in protectedmemory store213 is controlled (encapsulated) byidentity engine204.
By encapsulating the authentication data, theidentity engine204 logically binds the device owner201 to the owner's e-credentials220 controlled by identity engine204:
    • (a)Identity engine204 implements logical binding216 to bind the device owner201, viauser interface206, to the associated knowledge-basedauthentication data226 in protectedmemory store213. Owner201 is thereby logically bound to theirpersonal identity device202, as well as by means ofphysical custody205.
    • (b) Ifpersonal identity device202 has abiometric module211 biometrically binding owner201 to biometricbiometric module211 and hence topersonal identity device202,identity engine204 can employ logical binding217 to bindbiometric module211 to associatedbiometric authentication data226 in protectedmemory store213. Owner201 is thereby additionally bound todevice202 andidentity engine204.
    • (c) To detect possible loss of custody205 (To masquerade as owner, attacker would need to penetrate206,211,204 and226),identity engine204 can useauthentication control219 to causeuser interface206 andbiometric module211 to re-authenticate the user thereby verifying that device owner201 is persistently in control of theirpersonal identity device202.
If protectedmemory store213 can be removed by device owner201, owner201 can physically break logical binding216 thereby disabling authentication by means ofuser interface206 andbiometric module211, disablingidentity engine204 and thereby preventing other users from masquerading as personal identity device owner201. Owner201 can subsequently re-enable theiridentity engine204 by re-attaching protectedmemory store213. When aremovable memory store213 is removable, it is called an “ignition key”.
Associated with an e-credential of theowner220 are three (3) public-private encryption key pairs, the pairs being crypto-logically bound218 (see glossary) to each other, where the three (3)public keys225 of each pair are embedded in the e-credential220 of the owner, and the corresponding three (3)private keys227 of each pair are embedded intoremovable memory store213 controlled byidentity engine204.Legend275 identifies the six (6) types (3 pairs) of public-private encryption keys associated with an e-credential.
If protectedmemory store213 is removable (is an “ignition key”), public-private key crypto-logical bindings218 are broken whenignition key213 is removed thereby disablingidentity engine204 and enabling owner201 to havecustody214 of protectedmemory store213 including contained secrets of owner201, namely,authentication data226 andprivate encryption keys227.
By way ofcommunications interface240,identity engine204 can provision e-credentials of thedevice owner220 to other users101, toidentity services106, and toservice providers105. When so provisioned,public keys225 embedded in an e-credential of theowner220 are available to other collaborating parties (users and services). The pairedprivate keys227 within protectedmemory store213 are not revealed by theidentity engine204 of the owner to other users.
By way ofcommunications interface240,identity engine204 can acquire e-credentials ofother users230, and fromidentity services106. E-credentials ofother users230 have embeddedpublic encryption keys235. However, the private keys paired withpublic keys235 are not disclosed by thepersonal identity devices202 and containedidentity engines204 of other users101.
Cryptographic operations, associated with the encryption keys of a selectede-credential220 of an owner provided to other parties, are bound to device owner201 as follows (see legend275):
    • (a) Digital signing key s, a private key in213 associated withe-credential220 of the owner, can be used byidentity engine204 of owner201 to calculate, by means of a prior art encryption algorithm, a digital signature over a message, document or e-credential. Because216 and217 logically bind s to owner201, and because s is crypto-logically bound218 to verification key v, apublic key225 embedded ine-credential220, other parties having220 can use verification key v to verify that the digital signature applied to the message, document or e-credential must have been originated by owner201;
    • (b) Encryption key e, a public key embedded in e-credential220 provided by owner201, can be used by other parties, by means of a prior art encryption algorithm, to encrypt messages and documents sent to owner201. Because the matching decryption key d, aprivate key227 in213, is logically bound by216 and217 to owner201, and d is crypto-logically bound218 to e, other parties having e-credential220 can use e to encrypt electronic credentials, documents and messages that can only be decrypted by owner201 thereby providing assurances that only owner201 can read them;
    • (c) Embossing key ε, a private key in213 associated with the e-credential of owner201, can be used by the owner, by means of the present invention's digital sealing embossing and inspecting method (seeFIG. 5), to calculate and render a digital seal, and affix a digital seal (291,292,294,295) to an electronic credential, document or message. Because216 and217 logically bind ε to owner201, and because ε is crypto-logically bound218 to inspection key i (apublic key225 embedded in e-credential220), other parties having e-credential220 can use inspection key i to verify that the digital seal applied to the message, document or e-credential must have been created and affixed by owner201.
FIG. 2 also illustrates other users290, having personal identity devices and e-credentials, respectively affixingdigital seals291 and292 to e-credentials220 and anelectronic document245, thereby creating cryptographic bindings between the e-credentials of other users (issuers)290 and e-credentials220 of the owner, and documents andmessages245 contained inpersonal identity device202 of owner201. Described further inFIGS. 3, 4 and 5, a digital seal, by means of the embossing key ε of an e-credential of an owner, crypto-logically binds the identity of the owner, including an attestation (a declaration) specified by the owner, to an electronic artifact such that the owner cannot repudiate having affixed the digital seal to the attestation (declaration) and electronic artifact. Other parties can use the paired inspection key i of the e-credential to verify the digital seal. When another user290 selects one of their e-credentials to create a digital seal, affixing the digital seal to an e-credential220 of owner201, the non-repudiation property of the affixed digital seal provides elevated assurances to other parties that the personal identifying information specified bye-credential220 is that of owner201, and not of some other e-credential owner.
FIG. 3 Depicting Collaboration Among Users with Personal Identity Devices
Now referring toFIG. 3, this figure depicts collaboration among users with personal identity devices300.FIG. 3 depicts three (3) personal identity devices ofFIG. 2 collaborating with each other.
  • 1)FIG. 3 depicts scenarios wherein threeusers301,302 and303, havepersonal identity devices202 withpre-installed identity engine204, eachuser301,302 and303 respectively having e-credentials ECn, n=1, 2, 3 wherein ECn, has embedded public keys vn, enand inrespectively paired with private keys sn, dnand cnretained in protectedmemory store213. E-credentials, ECnn=1, 2, 3 are possibly digitally sealed.
  • 2) During any given collaboration session, the identity engine ofuser301 can request the identity engine ofuser302 to re-authenticateuser302 by means ofauthentication control219, returning a confirmation message touser301 verifying thatuser302 is persistently connected to thepersonal identity engine204 ofuser302.
  • 3) Using theiridentity engines204,users301 and302 establish a persistentsecure session390 as follows:
    • a)Users301 and302 digitally sign EC1and EC2using s1and s2respectively, and exchange these signed e-credentials.
    • b)Users301 and302 respectively apply v1and v2embedded in EC2and EC1to verify the digital signatures applied to each e-credential.
    • c) If the digital signatures applied to EC1and EC2successfully verify under v1and v2,users301 and302 can respectively apply e2of EC2and e1of EC1to encrypt messages sent to the other user,user302 employing d2of EC2anduser301 using d1of EC1to decrypt received messages fromusers301 and302 respectively.
    • d) Having executed 3) a), b) and c),users301 and302 have assurances that they are persistently bound to each other and are communicating over a secure channel. However, neither user can be certain that the identifying information specified in the credential provided by the other user actually represents that user, that is, the risk of user masquerade has not being eliminated.
  • 4)E-credential issuer302 attests to the identity ofe-credential requester301 over a persistentsecure session392.Users301 and302 use theiridentity engines204, executingstep 3 above, to exchange e-credentials EC1and EC2, thereby establishing a persistentsecure session390. User301 (the requester) acquires a digitally sealed e-credential from user302 (the issuer) as follows:
    • a) In addition to EC1,requester301 provides personal identifyinginformation203 toissuer302. EC1may be unsealed or previously sealed with one or more (multiple) digital seals affixed.
    • b)Issuer302 proofs requester301 against the provided personal identifyinginformation203 and the contents of EC1, possibly asking probing questions, thereby verifying that EC1unambiguously represents the identity ofrequester301. This is called “identity proofing”.
    • c) Ifrequester301 is successfully proofed,issuer302 uses theiridentity engine204 to affix a declaration (e.g. “proofed”) to EC1, uses embossing key ε2of EC2to create and affix a digital seal to EC1, and returns newly sealed e-credential EC1to requester301.
Having completed steps 4) a), b) and c),issuer302 thereby attests to the identity ofrequester301 whichattestation issuer302 cannot repudiate because the digital seal under embossing key ε2cryptographically binds the identity ofissuer302 to the identity of therequester301.
  • 5)Users301 and303 exchange and use e-credentials proofed and attested to by 3rdparties to establish secure sessions394. E-credential EC1ofuser301 has been digitally sealed and issued by user302 (per392); and e-credential EC3of user303 has been digitally sealed by the local bank manager, a notary public, of user303.Users301 and303 are not known to each other and wish to establish a secure session between them. To achieve appropriate identity assurances they employ theiridentity engines204 to execute the following steps:
    • a) Executing steps 3) a), b) and c), (see390)users301 and303 use e-credentials EC1and EC3to establish a persistent secure session between them wherein neither user is initially certain that the identifying information specified in the credential provided by the other user actually represents the other user.
    • b) However,users301 and303, by means of their identity engines, observe that e-credentials of the other user (EC1and EC3) have been proofed and digitally sealed by 3rdparties:
      • i)User301 uses i3of EC3to inspect and verify the digital seal applied to EC3and thereby becomes satisfied that the issuer (the bank manager) is sufficiently trusted to believe that the identity specified by EC3is that of user303.
      • ii) Similarly, user303 uses i1of EC1to inspect and verify the digital seal applied to EC1and thereby becomes satisfied thatissuer302 is sufficiently trusted to believe that the identity specified by EC1is that ofuser301.
    • c) Given these assurances,users301 and303 can proceed with their session with assurances that they are communicating with a sufficiently qualified collaborator.
By way ofsteps 1 to 5, identity assurances are provided among collaborating parties whereby a user with a personal identity device: is persistently bound to their device and the digitally sealed and issued e-credentials contained therein; is able to determine that an e-credential provided by a remote user must have been originated by that user; can determine that messages originated under this e-credential cannot be repudiated; can verify that the originating user is the sole party capable of reading messages employing that e-credential. An e-credential owner can also affix digital seals to e-credentials, documents and messages that can be verified (“inspected”) by other users wherein the user creating and affixing such seals cannot repudiate having digitally sealed them.
Now referring toFIG. 4 depicting electronic credentials (e-credentials) andrelationships400 described at various levels of detail including: an e-credential401 of an owner (a user), an e-credential template450 (Ane-credential template450 is an unsealed electronic credential with a default sealing image, and with all information elements left unspecified, including encryption keys. Thetemplate450 is used when creating a new e-credential for an owner), a default e-credential (Adefault e-credential402 can be created by theidentity engine204 of apersonal identity device202 such that the attributes specify thedevice identifier260 and/or theidentity engine identifier265. Such an e-credential may be useful in alternate embodiments to unambiguously identity the personal identity device of an owner and/or the installed identity engine software version and configuration—without revealing the identity of the owner (making the owner anonymous) of thesubject owner402, e-credentials ofissuers403, e-credentials of other users404, and personal identifying information405 of the owner. Depictedelectronic credential401 is an exemplar information structure for other credentials includinge-credential template450, default e-credential402, e-credentials ofissuers403, and e-credentials of other users404 (other users can also be issuers, for example, when users cross-issue e-credentials to each other).
FIG. 4 depicts various relationships including the e-credential of theowner401 referencing attached personal identifying information405; e-credentials ofissuers403 having been used to create, affix and issue406digital seals407 to e-credential401; and e-credential401 having been used to create, affix and issue408digital seals409 to e-credentials of other users404. Depicteddefault credential402 represents a digitally self-sealed410 e-credential that can be used to seal and issue e-credentials and electronic documents.
E-credential of theowner401 hase-credential attributes411 including an e-credential identifier, issue date, expiry date, and credential type, these elements specified when e-credential401 was created. The e-credential additionally specifies attributes of the owner412 (Anonymous identities can be created by omitting personally identifiable information when populating the attributes of an e-credential; pseudo-anonymous identities involve specifying identifying attributes such that they avoid characterizing the e-credential owner, while specifying attributes (e.g. “handles”) disclosed to designated collaborating users) including name(s) and identifier(s), distinguishing features (physical attributes of the subject owner), life events (e.g. birth, marriage, and divorce dates), endorsements, restrictions, and attached (personally) identifying information. For everydigital seal413 affixed to e-credential401, anissuing record414 is created by the issuer specifying the conditions under which the digital seal was created including: the encounter date(s); the types of encounters (in-person, online); the number of years that the subject has been known to the issuer; relevant certifications and qualifications of issuer (e.g. vetting and proofing experience, professional obligations, notarization qualifications); jurisdiction, policies and procedures applicable the issuing encounter; references to the documents that were proofed, if any; the attributes of the e-credential owner that were attested to by issuer440; and attributes of the subject, if any, that were conferred upon the e-credential owner by issuer441.
Every e-credential401 issued also specifies adigital seal image423 and is associated with three (3) public-private key pairs416 wherepublic keys417 are embedded intoe-credential401, and where the pairedprivate keys418 are in protectedmemory store213 of the owner'spersonal identity engine202, said public-private key pairs including a signing-verification key pair used to create and verify digital signatures applied to documents andmessages442; an encryption-decryption key pair used to encrypt and decrypt documents andmessages443; and an embossing-inspection key pair used in conjunction with thedigital seal image423 where the embossing key is used to create digital seals444, and the inspection key is used to verify digital seals445.
FIG. 5 Depicting Digital Sealing and Digital Seal Inspection Methods
FIG. 5 depicts digital sealing and digitalseal inspection methods500 applied to electronic artifacts including an e-credentials, documents and a messages.Digital sealing method519 and digitalseal inspection method520 are depicted,digital sealing method519 comprised of ahash method530, anemboss method532 and a rendermethod534, and digitalseal inspection method520 comprised ofextract method540, inspectmethod541,hash method542 and comparemethod543.
Digital sealing method519 creates and affixes a digital seal toelectronic artifact501 by:
    • a) selecting an e-credential521 of a user and acquiringdeclaration510 from the e-credential owner;
    • b) selectingpre-determined elements526 ofartifact501, and thedigital sealing image523,inspection key524, embossing key525, andpre-determined attributes522 of e-credential521, including at least thee-credential identifier517;
    • c) concatenating526,510,522 (including217),523, and524, and applyinghash method530 to yield digest531;
    • d) usingemboss method532 in combination with embossing key525, a private encryption key of e-credential521, to encrypt digest531 yieldingdigital seal signature533;
    • e) using rendermethod534 to combinedigital sealing image523,declaration510,pre-determined attributes522,inspection key524, anddigital seal signature533 thereby renderingdigital seal528;
    • f) and affixing535digital seal528 toartifact501.
Digitalseal inspection method520 extracts and verifiesdigital seal528 affixed toartifact501 by:
    • a) usingextract method540 to extract from affixeddigital seal528,declaration510, predetermined attributes522 (including517), digital sealingimage523, inspection key (i)524, anddigital seal signature533;
    • b) concatenatingpre-determined elements526,declaration510, pre-determined issuer attributes522 (including217), digital sealingimage523, and inspection key (i)524, and applyinghash method542 to yieldresult544;
    • c) using inspectmethod541 in combination with extractedpublic inspection key524, to decrypt extracteddigital seal signature533 yieldingresult545;
    • d) and comparing, by means of comparemethod543, result544 and result545, indicating “digital seal verified”546 if544 and545 match, and indicating “digital seal failed to verify”547 if544 and545 do not match.
FIG. 6 depicts a usage scenario illustrating the issuing of a true copy e-credential of aphysical credential600 such as a driver's license.E-credential requester601 uses theirpersonal identity device202 to take602 adigital photograph603 of a physical credential604 (e.g. requester's driver's license). By means of the requester'spersonal identity device202,requester601 prepares ane-credential request605 by populating ane-credential template450 and attachingdigital photograph603 to request605. By means of a mutually trustedchannel606 submitsrequest605 to thepersonal identity device202 of ae-credential issuer607. By means of an in-person or online encounter,issuer607 performs identity proofing608 ofrecipient601 with respect to the submittede-credential request605 and the attacheddigital photograph603 ofphysical credential604, and other personal identifying information that may be required. Finally, upon successful identity proofing,issuer607, by means of the issuer'spersonal identity device204, issues a true copy e-credential609 ofphysical credential604 to thepersonal credentialing device202 of therequester601, and writes a copy of the true copy e-credential609 and atransaction record610 to ane-credential registry611.
FIG. 7 depicts a usage scenario illustrating the issuing of a true copyself photograph e-credential700, for example, one associated with other personal identifying information to create an electronic business card. Thee-credential requester701 uses theirpersonal identity device202 to take702 adigital self photograph704. By means of the requester'spersonal identity device202,requester701 prepares ane-credential request703 by populating ane-credential template450 and attaching thedigital self photograph704 to request703. By means of a mutually trustedchannel705,requester701 submitsrequest703 with attached digital self photograph to thepersonal identity device202 ofe-credential issuer706. By means of in-person or online encounter,issuer706 performs identity proofing707 ofrecipient701 with respect to submittede-credential request703, the attachedself photograph704, and other personal identifying information that may be required. Finally, upon successful identity proofing,issuer706, by means of the issuer'spersonal identity device202 and the mutually trustedchannel705, issues a true copyself photograph e-credential709 to thepersonal identity device202 ofrequester701, and writes the true copyself photograph e-credential709 and atransaction record710 toe-credential registry711.
FIG. 8 depicts a usage scenario illustrating the issuing of an original electronic credential (e-credential). Thee-credential requester801 uses theirpersonal identity device202 to populate ane-credential template450 to prepare ane-credential request802. By means of mutually trustedchannel803,requester801 submitsrequest802, possibly attaching other relevant personal identifying information, toissuer804 by way of the issuer'spersonal identity device202. By means of an in-person or online identity encounter,issuer804 performs identity proofing805 ofrequester801 with respect to the submittedrequest802, other personal identifying information that may be attached includingphysical credentials806 that may be required, and personal identifying information that may be retrieved from the issuer'se-credential registry807. Upon successful identity proofing,issuer804 uses theirpersonal identity device202 to take adigital photograph808 ofrequester801, attaches the digital photograph to the submittede-credential request802, digitally sealse-credential request802 thereby creatingnew e-credential809. Finally,issuer804, by means of the issuer'spersonal identity device202 and mutually trustedchannel803, sends digitally sealed e-credential809 to thepersonal credentialing device202 ofrequester801, and writes a copy ofe-credential809 andtransaction record811 toe-credential registry807.
FIG. 9 depictingalternate embodiments900, includes a user920, asmart phone901, atablet computer902, alaptop computer903, and apersonal computer904. Persons skilled in the art will recognize that many hardware and software variations, configurations and deployments of the inventive subject matter are possible. For example, various biometric mechanisms, digital camera configurations, and operating systems may be configured for any given personal identity device.
FIG. 9 also depicts possible future embodiments that could be developed and integrated to support the installation and deployment of the inventive subject matter including asmart card905, asmart ring906, a smart watch907, andsmart glasses908. For example, instead of being maintained within a single personal credentialing device202 (e.g. smart phone901), the user's e-credentials909 with embedded public keys, paired withprivate keys912 in protectedmemory store911 could be otherwise deployed.FIG. 9 depicts user920 having asmart phone901 communicating over pre-configured trusted communication channels910 with asmart card905 or asmart ring906 with embedded protectedmemory store911 containing private keys andsecrets912 of user920.FIG. 9 also depicts a smart watch907 containinge-credentials909 of user including embedded public keys.Smart glasses908 could be similarly created and integrated with asmart phone901. For example, thesmart glasses908 could (i) retrieveprivate keys912 from thesmart ring906, (ii) read an encrypted page into thesmart glasses908, (iii) decrypt the page; and (iv) render the decrypted page in plain text on the inner surface of thesmart glasses908 for user920 to read. Such an embodiment avoids decryption of documents within the user's personal identity device, thereby decreasing the risk of document tampering. Another embodiment would be for e-credentials of theuser909 andprivate keys912 to be maintained insmart card905 communicating with the user'ssmart phone901. Those skilled in the art will recognize that segmenting the artifacts of the inventive subject matter among distinct hardware devices reduces identity theft risk.
FIG. 10 depicts the potential scope of electronic identity andcredentialing usage1000. This figure showsuser1001 holding apersonal identity device204 containing a group ofelectronic credentials1003 to1013 issued touser1001. This figure also showsrepresentative credential issuers1002 holding personal credentialing devices who have issued electronic credentials touser1001.Grouping1020 represents individual users who can issue simple e-credentials touser1001 such as true copy photographs1003. Grouping1022 represents individual users with elevated qualifications and obligations sufficient, for example, to issue certified true copies of driver's licenses.Grouping1021 represents organizations and networks without credential issuing agents that nevertheless acceptelectronic credentials1003,1004 and1007. Groupings1023 to1028 represent institutions and organizations having credentialing agents (authorities) charged with issuing e-credentials to employees, customers and the public. The example of departments of motor vehicles (DMVs)1025 illustrates wide dissemination and usage of electronic driver's licenses across most groupings.Grouping1029 represents e-business merchants and suppliers who mainly leverage electronic credentials issued by the credential issuers of the other groupings.
Now referring toFIG. 11 relating physical credentialing, prior art PKI and PGP technologies, and e-credentialing system1100.FIG. 11A depicts a physical credentialing system;FIG. 11B depicts prior art Public Key Infrastructure (PKI);FIG. 11C depicts prior art Pretty Good Privacy (PGP); andFIG. 11D depicts the inventive subject matter, an electronic identity and credentialing system.
FIG. 11A depicts a physical credentialing system illustrating the range of identifyingattributes1101 of a person mapped tophysical credentials1102 and other personal identifyinginformation1103 of a user1104. When requestingphysical credential1105, the user1104, submits their existing physical credential(s)1102 and other identifyinginformation1103 to anagent1106 of the credential issuing organization, together with a credential request1107 (a completed application form) specifying selected identifyingattributes1101 of the user to theagent1106. Theagent1106 proofs the provided information,issues1108credential1105 to the user1104, and writestransaction record1109 into thecredential registry1110.
FIG. 11B depicts a Public Key Infrastructure (PKI) usage scenario wherein a certificate authority (C)1120, an identity provider, possesses a signed (digital)certificate1121 with public key qc, matching private key pc, with digital signature dsrsigned and issued byroot certificate authority1122. In response to acertificate request1123 from user X1124, certificate authority (C)1120 generates, signs, andissues1126 to user1124 a signed (digital) certificate (name=X)1125 with public key qx, private key px, and digital signature dsccalculated using signeddigital certificate1121 ofcertificate authority1120.
FIG. 11C depicts a Pretty Good Privacy (PGP) usage scenario where user A1140 requests user B1141 to digitally sign and return user A's digital certificate. Initially, using installed PGP software, user A creates an unsigned digital certificate (name=A)1142 containing public key qapaired with private key pastored outside the context ofcertificate1142. User B similarly creates an unsigned digital certificate (name=A)1143 containing public key qbpaired with private key Pb stored outside the context ofcertificate1143. On an ad hoc basis, user A and user B agree to exchange digital certificates, for example, by secure email using pre-determined symmetric encryption keys. User A sends unsigneddigital certificate1144 to user B (private key pais not sent to user B) requesting user B to digitally sign user A's digital certificate. User B, upon receiving user A'sdigital certificate1144, uses user B's private key pbto digitally sign user A'sdigital certificate1144, calculating and affixing digital signature dsbto user A's digital certificate and subsequently sending the signeddigital certificate1145 to user A. The PGP software finally associates1146 private pawith the newly signeddigital certificate1147.
FIG. 11D depicts a usage scenario of the present invention, namely, an electronic identity and credentialing system. This figure illustratesuser A1160, user B1161 anduser C1162 using their respectivepersonal identity devices1163,1164,1165 to request and issue an e-credential for user A, wherein user A requests an e-credential, and both user B and user C issue a new e-credential to user A following a round-robin issuing process116611671168. After installation and setup, the personal identity devices of users A, B and C each contain a self-sealed default e-credential1169 with digital sealing image, public keys, and associated private keys (FIG. 11D only depicts thedefault e-credential1169 of user A). User A completes ane-credential request1170 initialized with digital sealing image, public keys, and associated private keys, specifying selected attributes of the user, possibly attaching other personal identifying information, and then selectingdefault credential1169 to digitally seal1171e-credential request1170. User A subsequently sends (1166) the e-credential request1172 (not including private keys) to user B. User B verifiesdigital seal1171 ofe-credential request1170, proofs user A against the contents ofe-credential request1170, and if verified, calculates and affixes digital seal (dŝb) (dŝxdenotes a digital seal signature, while dsxdenotes a digital signature) toe-credential request1170. User B then forwards (1167) the partially sealed and issued e-credential, to user C who follows the same proofing and verification steps as user B, affixing a digital seal (dŝc) and issuing (1168), now doubly sealed e-credential1173, to user A. Upon receiving newly issued e-credential1173, the original e-credential request is replaced by the newly created e-credential, digitally sealed by a selected e-credential of the requester (e.g. default credential1169) (thereby becoming triply sealed1171), and the private keys originally associated with the e-credential request are re-associated with the newly issued e-credential1174.
The present invention provides several improvements and advantages over prior art PKI and PGP identity systems including:
    • (a) Private keys are never revealed outside the context of the user's personal identity device, while PKI certificate authorities allow the distribution of private keys over networks;
    • (b) Supports e-credentials that can contain a range of personal identifying information while PKI and PGP digital certificates can specify only names and identifiers;
    • (c) Enables an e-credential owner to be crypto-logically bound to their e-credential by three (3) encryption key pairs while PKI and PGP digital certificates specify only a single key pair;
    • (d) E-credentials support three (3) public-private key pairs used for distinct purposes while PKI and PGP digital certificates allow sharing a single encryption key across multiple applications;
    • (e) By means of digital sealing, an e-credential issuer cannot repudiate having issued an e-credential. Digital signatures applied to PKI and PGP digital certificates can be repudiated;
    • (f) An owner's personal identity device logically binds the owner's authentication data to their e-credentials and hence to the owner. PKI and PGP do not support such binding mechanisms;
    • (g) The present invention supports 3rdparty attestation of e-credentials among device owners. PKI provides only server-centric attestations;
    • (h) Provides a mechanism for personalizing and visualizing a digital seal applied to e-credentials, documents and messages. PKI and PGP do not specify such mechanisms.
      Disadvantages
    • (a) Personal identity devices are not normally shared while desktops and laptops are commonly shared. Tablet computers and smart phones are less likely to be shared. Given the risks of sharing, personal identity devices should not be shared.
    • (b) The present invention does not describe how the system will be integrated with identity services and service providers, or how the inventive subject matter can be transitioned from prior art identity systems such as public key infrastructure based systems. These tasks are left to others to solve.
    • (c) The inventive subject matter is more complex than the cited relevant prior art. Although the additional effort required for deployment and operation may appear to be a disadvantage, it is believed that the benefits of reduced identity theft and electronic fraud will off-set this apparent disadvantage.
During the discovery effort, several meaningful insights into electronic identity and credentialing emerged, leading to unanticipated discoveries and novel features that enhanced the utility of the present invention. For example, the initial phase of the discovery process did not anticipate the potential of digital cameras embedded into a user's personal identity device. Nor did it consider applying some of the practices of notary publics when proofing personal identifying information.
Digital Sealing Method: Notary practices stimulated the discovery of the present invention's method for digitally applying seals to e-credentials and other electronic documents. The notary's process suggested a powerful technical solution that can also be rendered programmatically. This discovery process began by observing that a notary public, after proofing a document, uses their embosser (a stamping device) to impress their seal onto documents to be notarized. The purpose of the seal is to detect tampering with both the document and the seal itself. The notary's impressed seal is also useful to trace the proofing and sealing event back to the notary's registry. This manual process motivated the creation of the present invention's digital sealing method whereby the issuer's embossing key is used to create a digital seal signature that cryptographically binds and protects both the sealed document and the seal, containing selected attributes of the issuer, against tampering. The inspection key, a public key paired with the embossing key, is used to verify the digital seal signature to detect both tampering with the seal and the document. Because these keys are bound to the e-credentials of the owner, an issuer using their embossing key when digitally sealing a document, cannot repudiate having applied this key, and hence the seal.
Personalized Digital Seals: It was observed that a notary's seal includes a commission number, expiry date, jurisdiction, and possibly other identifying attributes of the notary. Furthermore, because notary is licensed by a given jurisdiction, seals often incorporate images such as state animals, flowers, landmarks. This motivated the idea of personalizing digital seals by enabling the specification of a “sealing image” [e.g. a jpg or bitmap] for every credential. Furthermore, the digital sealing process was enhanced by including the sealing image in the calculation of the digital seal signature, thereby protecting the seal image as well as the document and the contents of the seal, containing selected attributes of the issuer, from tampering. This technical feature enables visualization improvement opportunities. For example, software renderings of a cryptographically bound sealing image (e.g. photos, logos, written signatures), if tampered with, could be rendered with a strong warning and prevent certain operations that might put the user at risk.
Notaries and Integrated Digital Cameras: Examining the best practices of Notary Publics combined with the photographic capabilities of mobile computing devices stimulated unanticipated new types of electronic credentials that exploit front-facing and forward-facing cameras. It was derived from the process of certifying true copies of legal documents [e.g. birth certificates and citizenship papers] and application of the notary's embosser to impress the notary's seal onto the document.
Certified True Copy E-Credentials: This refinement of the present invention involves the application of the forward-facing camera of a mobile device: taking a digital photograph of a physical credential [e.g. a driver's license]; creating and completing a credential template; attaching the photograph to the template; and submitting a new e-credential request to the issuer's personal identity device. Upon successful proofing of the physical credential and the attached photograph, the issuer creates a new e-credential and attaches the photograph to the new e-credential by way of the user's personal identity device. Finally, the issuer selects an embossing key to digitally seal both the new credential and the attached photograph, remitting this “certified true copy e-credential” to the user.
Certified True Translation Credentials: The above true copy example stimulated the idea of creating additional types of true copy variants by means of the forward-facing camera including true copy translations of birth certificates written in other languages.
Certified True Copy Photographs: The above examples stimulated additional refinements. In the first case the user takes a digital self-portrait using the front-facing camera; attaches the photograph to the new credential request; and the issuer returns a digitally sealed certified true copy credential with the attached photograph also digitally sealed. The second case involves a photograph being taken by the issuer's forward-facing camera and returning the sealed credential and sealed photograph.
Identity Proofing with Multi-Media Conferencing: The potential application of multi-media conferencing, using cameras and audio, was not anticipated until the identity assurance implications of in-person and known-person identity proofing became fully appreciated:
    • a) For in-person identity proofing, the person requesting an e-credential person need not be known to the e-credential issuer. However, personal identifying information, including at least one physical credential (e.g. a driver's license), should be required;
    • b) For known-person identity proofing where the requester and issuer have known each other personally for a prescribed period of time (e.g. 2 or more years), personal identifying information may not be deemed to be necessary;
    • c) Under both in-person and known-person identity proofing scenarios, depending on the level of perceived risk, it may be advisable for the collaborating users to establish a mutually trusted channel between their personal identity devices.
    • d) When e-credentialing over an online application (like video conferencing), depending on the perceived risk, it may be acceptable for collaborating users to exchange a one-time secret over an alternate channel, and use that secret to create a shared symmetric encryption key to establish the mutually trusted channel.

Claims (4)

The invention claimed is:
1. An electronic identity and credentialing system comprising of: at least one of a plurality of personal identity devices with memory,
wherein, the system is further comprised of collaborating users, acquiring, issuing and using electronic identities, each user owning personal identifying information and owning at least one of the personal identity devices, interoperable with the personal identity devices of other users;
wherein the personal identity device has a network interface, a digital camera, a user interface, a biometric module, authentication data, electronic documents and messages, and a pre-installed identity engine;
wherein an identity engine has electronic credentials contained therein specifying selected identifying information of the e-credential owner, the identity engine also controlling e-credentials of other device users contained therein, and a protected memory store;
wherein the protected memory store, removable from the personal identity device, is controlled by the identity engine to safeguard secrets of the device owner therein, the identity engine not disclosing the secrets of the owner, the secrets utilized for pre-determined operations of the identity engine;
wherein owners of personal identity devices in their physical custody, each owner persistently bound to their device by way of authentication data, selecting an e-credential attested to by other device users, the owner can utilize their personal identity device to unambiguously identify themselves and securely collaborate with other device owners using cryptographic methods bound to the selected e-credential which cannot be employed by another user to masquerade as the device owner because the other user does not have the private keys paired with the public keys embedded in the selected e-credential;
whereby if the protected memory store containing the secrets of the owner is removable and is subsequently removed by the owner, the owner's device is thereby rendered inoperable wherein an e-credential is an electronic document specifying selected personal identifying information of the e-credential owner and three public-private encryption key pairs, the three public encryption keys embedded in the e-credential, the three paired private encryption keys maintained by the identity engine outside the context of the e-credential in a protected memory store;
wherein an e-credential includes an e-credential identifier, an issue date, an expiry date, if any, and an e-credential type;
wherein an e-credential also includes attributes of the e-credential owner including at least one identifying name of the owner, including a full legal name, a commonly used name, or a pseudonym;
a plurality of distinguishing features of the owner including hair color, eye color, height, markings;
a plurality of life events and dates of the owner including birth, baptism, marriage, divorce, and death;
a plurality of endorsements of the owner including driving, citizenship, immigration, travel, voting, work authorization, professional, permissions, roles, responsibilities, and financial authorizations;
a plurality of restrictions including handicaps, aids, travel and legal;
and personal identifying information including physical credentials, certifications, and digital photographs including photographs and photocopies of physical credentials, certifications, utility bills and other personal identifying information,
wherein an e-credential also contains a plurality of issuing records, a record including encounter date(s), types of encounters, number of years the owner was known by the issuer, the certifications and qualifications of the issuer, the jurisdiction, policies, procedures of the issuer, identifying information proofed by the issuer, attributes of the owner attested to by the issuer, and attributes conferred on the e-credential owner by the issuer,
wherein an e-credential includes a digital sealing image employed by the identity engine to render a digital seal created and applied by the e-credential owner to electronic artifacts;
wherein an e-credential further has affixed a plurality of digital seals rendered and applied by the identity engines of collaborating issuers, and possibly affixed by the identity engine of the e-credential owner;
wherein an e-credential is used to represent the identity of the e-credential owner to other personal identity device users, to remote identity services, and to remote service providers,
wherein the three public-private encryption key pairs, said pairs being bound to each other crypto-logically and being logically bound to the e-credential of an owner that has been proofed and attested to by other users, include a private digital signing key (s) paired with a public verification key (v), a private decryption key (d) paired with a public encryption key (e) and a private embossing key (ε) paired with a public inspection key (t),
wherein the private digital signing key (s) of a proofed and attested to e-credential of a first user, the e-credential owner, the private digital signing key (s) being a private key bound to the first user by means of an identity engine of the first user, can be used by the identity engine to calculate a digital signature over an electronic artifact, including a message, a document and an e-credential;
and the paired public verification key (v) embedded in the e-credential of the first user can be used by an identity engine of a second user, including the identity engine of the first user, to verify that the digital signature calculated over said artifact must have been calculated by the identity engine of the first user, thereby verifying that the artifact must have been originated by the first user, and no other user;
wherein the public encryption key (e), a public key embedded in the proofed and attested to the e-credential of a first user, the e-credential owner, can be used by the identity engine of a second user to encrypt electronic artifacts, including messages, documents and e-credentials, sent to the identity engine of the first user which can use the paired private decryption key (d) of the first user bound by means of the identity engine of the first user, to decrypt the artifact, thereby ensuring that only the e-credential owner, and no other owner, can read the artifact;
wherein the private embossing key (ε) of a proofed and attested to e-credential of the first user,
the e-credential owner, the private embossing key (ε) being a private key bound to the first user by means of an identity engine of the first user, can be used by the identity engine to create a digital seal over an electronic artifact, including a message, a document and an e-credential;
and the paired public inspection key (i) embedded in the e-credential of the first user can be used by an identity engine of a second user, including the identity engine of the first user, to verify that the digital seal over said artifact must have been created by the identity engine of the first user, thereby verifying that the digital seal must have been applied by the first user, and no other user; wherein an e-credential owner cannot repudiate having digitally signed a message, document or e-credential;
whereby a message, document or e-credential encrypted by a user employing the e-credential of an owner can only be decrypted by the e-credential owner;
and an e-credential owner cannot repudiate having applied a digital seal to a message, document, or e-credential.
2. The electronic identity and credentialing system ofclaim 1,
wherein the owner of a personal identity device is bound to the device by way of physical custody;
wherein authentication data of the device owner, being secrets of the owner, including PINs, passwords, and biometric minutia of the device owner, are captured and updated by means of the user interface and the biometric module, are retained in the protected memory store controlled by the identity engine, and are provided by the identity engine to the user interface and biometric module when requested and when said authentication data is available, thereby logically binding the personal identity device to the device owner and the e-credentials contained within the identity engine;
wherein the identity engine is operable to issue requests to the user interface and biometric module to authenticate the device owner, providing authentication data to the user interface and biometric module, and in response receiving notifications of the success or failure of authentication attempts, thereby additionally binding the device owner to the e-credentials of the owner retained by the identity engine.
3. The electronic identity and credentialing system ofclaim 1,
wherein an e-credential of the owner additionally contains three public encryption keys, each public key crypto-logically bound to a paired private key, the private keys being secrets of the device owner retained in the protected memory store, not being disclosed by the identity engine to other parties, the e-credentials of other users disclosing only the public keys embedded in said e-credentials;
wherein, the three paired public and private keys associated with an e-credential of an owner, thereby associated with specified personal identifying information of the owner, are bound to pre-determined cryptographic methods of the identity engine including a cryptographic method whereby a first owner of a personal identity device, having proofed the personal identifying information specified by the e-credential of a second owner, can bind an attestation that cannot be repudiated to the identity of the second device owner by affixing a cryptographic signature to the e-credential of the second device owner.
4. The electronic identity and credentialing system ofclaim 1,
wherein the protected memory store, if removable and in the control of the device owner by way of physical custody, can be utilized by the device owner to disable device owner authentication while also breaking the logical bindings between the personal identifying information contained in the e-credentials of the device owner and the crypto-logical bindings enabling the pre-determined cryptographic methods of the identity engine, said bindings being re-established when the device owner re-attaches the protected memory store.
US14/503,7972013-10-012014-10-01Electronic identity and credentialing systemActive2035-05-08US9646150B2 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US14/503,797US9646150B2 (en)2013-10-012014-10-01Electronic identity and credentialing system
US15/497,635US9900309B2 (en)2013-10-012017-04-26Methods for using digital seals for non-repudiation of attestations
US15/898,617US10127378B2 (en)2014-10-012018-02-18Systems and methods for registering and acquiring E-credentials using proof-of-existence and digital seals
US16/188,117US10756906B2 (en)2013-10-012018-11-12Architecture and methods for self-sovereign digital identity

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201361885251P2013-10-012013-10-01
US14/503,797US9646150B2 (en)2013-10-012014-10-01Electronic identity and credentialing system

Related Child Applications (2)

Application NumberTitlePriority DateFiling Date
US15/497,635DivisionUS9900309B2 (en)2013-10-012017-04-26Methods for using digital seals for non-repudiation of attestations
US15/898,617Continuation-In-PartUS10127378B2 (en)2013-10-012018-02-18Systems and methods for registering and acquiring E-credentials using proof-of-existence and digital seals

Publications (2)

Publication NumberPublication Date
US20150095999A1 US20150095999A1 (en)2015-04-02
US9646150B2true US9646150B2 (en)2017-05-09

Family

ID=52741541

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/503,797Active2035-05-08US9646150B2 (en)2013-10-012014-10-01Electronic identity and credentialing system
US15/497,635ActiveUS9900309B2 (en)2013-10-012017-04-26Methods for using digital seals for non-repudiation of attestations

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US15/497,635ActiveUS9900309B2 (en)2013-10-012017-04-26Methods for using digital seals for non-repudiation of attestations

Country Status (1)

CountryLink
US (2)US9646150B2 (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20160344741A1 (en)*2014-10-102016-11-24Salesforce.Com, Inc.Integration User for Analytical Access To Read Only Data Stores Generated From Transactional Systems
US20170255805A1 (en)*2016-03-072017-09-07ShoCard, Inc.Transferring Data Files Using a Series of Visual Codes
CN108199836A (en)*2018-01-222018-06-22北京大学A kind of key and apparatus bound, the method and device of solution binding
US10049141B2 (en)2014-10-102018-08-14salesforce.com,inc.Declarative specification of visualization queries, display formats and bindings
US10089368B2 (en)2015-09-182018-10-02Salesforce, Inc.Systems and methods for making visual data representations actionable
US10101889B2 (en)2014-10-102018-10-16Salesforce.Com, Inc.Dashboard builder with live data updating without exiting an edit mode
US10115213B2 (en)2015-09-152018-10-30Salesforce, Inc.Recursive cell-based hierarchy for data visualizations
US10129252B1 (en)*2015-12-172018-11-13Wells Fargo Bank, N.A.Identity management system
US10127378B2 (en)2014-10-012018-11-13Kalman Csaba TothSystems and methods for registering and acquiring E-credentials using proof-of-existence and digital seals
US10270774B1 (en)2015-01-262019-04-23Microstrategy IncorporatedElectronic credential and analytics integration
US10311047B2 (en)2016-10-192019-06-04Salesforce.Com, Inc.Streamlined creation and updating of OLAP analytic databases
US10325084B1 (en)*2018-12-112019-06-18block.oneSystems and methods for creating a secure digital identity
CN110278084A (en)*2018-03-162019-09-24华为技术有限公司 eID establishment method, related equipment and system
US10523660B1 (en)*2016-05-132019-12-31MobileIron, Inc.Asserting a mobile identity to users and devices in an enterprise authentication system
US10673838B2 (en)2016-05-132020-06-02MobileIron, Inc.Unified VPN and identity based authentication to cloud-based services
US10728039B2 (en)*2009-06-052020-07-28Signix, Inc.Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
US10756906B2 (en)2013-10-012020-08-25Kalman Csaba TothArchitecture and methods for self-sovereign digital identity
US10979227B2 (en)2018-10-172021-04-13Ping Identity CorporationBlockchain ID connect
US11044087B2 (en)*2017-11-152021-06-22Alexander J. M. Van Der VeldenSystem for digital identity authentication and methods of use
US11062106B2 (en)2016-03-072021-07-13Ping Identity CorporationLarge data transfer using visual codes with feedback confirmation
US11082221B2 (en)2018-10-172021-08-03Ping Identity CorporationMethods and systems for creating and recovering accounts using dynamic passwords
US11134075B2 (en)2016-03-042021-09-28Ping Identity CorporationMethod and system for authenticated login using static or dynamic codes
US11170130B1 (en)2021-04-082021-11-09Aster Key, LLCApparatus, systems and methods for storing user profile data on a distributed database for anonymous verification
US11190507B2 (en)*2018-09-272021-11-30Apple Inc.Trusted device establishment
US11206133B2 (en)2017-12-082021-12-21Ping Identity CorporationMethods and systems for recovering data using dynamic passwords
US20220014414A1 (en)*2020-07-072022-01-13Realtek Semiconductor Corp.Method and system for authentication data transmission
US11251958B2 (en)*2019-08-122022-02-15Bank Of America CorporationSecurity system with adaptive authentication based on tokenization chaining
US11323272B2 (en)2017-02-062022-05-03Ping Identity CorporationElectronic identification verification methods and systems with storage of certification records to a side chain
US11456876B2 (en)*2015-03-262022-09-27Assa Abloy AbVirtual credentials and licenses
US11544367B2 (en)2015-05-052023-01-03Ping Identity CorporationSystems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual
US20240104295A1 (en)*2022-09-222024-03-28Adobe Inc.Systems and methods for joint document signing
US20240137362A1 (en)*2018-06-082024-04-25Wells Fargo Bank, N.A.Two-way authentication system and method
USRE49968E1 (en)2017-02-062024-05-14Ping Identity CorporationElectronic identification verification methods and systems with storage of certification records to a side chain
US12014096B1 (en)2023-09-142024-06-18Bank Of America CorporationSystem and method for remote authentication based on computer-vision technologies
US20240205013A1 (en)*2022-12-202024-06-20International Business Machines CorporationPrivacy preserving authentication augmented with physical biometric proof
US12261852B2 (en)2015-10-142025-03-25Blockchains, Inc.Systems and methods for managing digital identities

Families Citing this family (163)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100114768A1 (en)2008-10-312010-05-06Wachovia CorporationPayment vehicle with on and off function
US10867298B1 (en)2008-10-312020-12-15Wells Fargo Bank, N.A.Payment vehicle with on and off function
US9824198B2 (en)2011-07-142017-11-21Docusign, Inc.System and method for identity and reputation score based on transaction history
US9003507B2 (en)*2012-03-232015-04-07Cloudpath Networks, Inc.System and method for providing a certificate to a third party request
US9887983B2 (en)2013-10-292018-02-06Nok Nok Labs, Inc.Apparatus and method for implementing composite authenticators
US10270748B2 (en)2013-03-222019-04-23Nok Nok Labs, Inc.Advanced authentication techniques and applications
US9396320B2 (en)2013-03-222016-07-19Nok Nok Labs, Inc.System and method for non-intrusive, privacy-preserving authentication
IN2013MU01162A (en)*2013-03-262015-05-22Tata Consultancy Services Ltd
US9961077B2 (en)2013-05-302018-05-01Nok Nok Labs, Inc.System and method for biometric authentication with device attestation
US20150317626A1 (en)*2014-04-302015-11-05Intuit Inc.Secure proximity exchange of payment information between mobile wallet and point-of-sale
US9654469B1 (en)2014-05-022017-05-16Nok Nok Labs, Inc.Web-based user authentication techniques and applications
US10834592B2 (en)*2014-07-172020-11-10Cirrent, Inc.Securing credential distribution
US10154409B2 (en)*2014-07-172018-12-11Cirrent, Inc.Binding an authenticated user with a wireless device
US10356651B2 (en)2014-07-172019-07-16Cirrent, Inc.Controlled connection of a wireless device to a network
US9942756B2 (en)2014-07-172018-04-10Cirrent, Inc.Securing credential distribution
US10148630B2 (en)2014-07-312018-12-04Nok Nok Labs, Inc.System and method for implementing a hosted authentication service
US9875347B2 (en)2014-07-312018-01-23Nok Nok Labs, Inc.System and method for performing authentication using data analytics
TWI581629B (en)*2014-08-072017-05-01 A Method and System for Message Transmission without Marked Identification
US10032011B2 (en)*2014-08-122018-07-24At&T Intellectual Property I, L.P.Method and device for managing authentication using an identity avatar
US9288050B1 (en)2014-09-252016-03-15International Business Machines CorporationUnified storage and management of cryptographic keys and certificates
US9942200B1 (en)*2014-12-022018-04-10Trend Micro Inc.End user authentication using a virtual private network
US11615199B1 (en)*2014-12-312023-03-28Idemia Identity & Security USA LLCUser authentication for digital identifications
DE102015202215A1 (en)*2015-02-092016-03-24Siemens Aktiengesellschaft Device and method for safe operation of the device
US10853592B2 (en)*2015-02-132020-12-01Yoti Holding LimitedDigital identity system
US20160261412A1 (en)*2015-03-042016-09-08Avaya Inc.Two-Step Authentication And Activation of Quad Small Form Factor Pluggable (QFSP+) Transceivers
US10467468B2 (en)*2015-03-092019-11-05Michigan Health Information Network Shared ServicesSystem and method for identity proofing and knowledge based authentication
US11429975B1 (en)*2015-03-272022-08-30Wells Fargo Bank, N.A.Token management system
US10025916B2 (en)*2015-03-272018-07-17Samsung Electronics Co., Ltd.Method and apparatus for executing device according to usage authority
US9807086B2 (en)2015-04-152017-10-31Citrix Systems, Inc.Authentication of a client device based on entropy from a server or other device
US10122709B2 (en)2015-05-122018-11-06Citrix Systems, Inc.Multifactor contextual authentication and entropy from device or device input or gesture authentication
US9692603B2 (en)*2015-05-152017-06-27Verizon Patent And Licensing Inc.Biometric PKI authentication
US10387980B1 (en)*2015-06-052019-08-20Acceptto CorporationMethod and system for consumer based access control for identity information
US20170012783A1 (en)*2015-07-102017-01-12Entrust, Inc.Low friction device enrollment
EP3119032A1 (en)*2015-07-132017-01-18Gemalto SaSecurity management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server
CN108292352A (en)2015-07-202018-07-17公证公司System and method for verifying electronic signature session identity
US11170364B1 (en)2015-07-312021-11-09Wells Fargo Bank, N.A.Connected payment card systems and methods
US9699196B1 (en)*2015-09-292017-07-04EMC IP Holding Company LLCProviding security to an enterprise via user clustering
US11587096B2 (en)*2015-10-142023-02-21Accreditrust Technologies, LLCSystems and methods for interdependent identity based credential collection validation
SE1551459A1 (en)*2015-11-112017-05-12Authentico Tech AbMethod and system for user authentication
US10034174B1 (en)*2015-12-212018-07-24United Services Automobile Association (Usaa)Systems and methods for authenticating a caller using biometric authentication
US9935962B2 (en)*2016-01-192018-04-03Qualcomm IncorporatedMethod and system for onboarding wireless-enabled products in a network
US11423177B2 (en)*2016-02-112022-08-23Evident ID, Inc.Systems and methods for establishing trust online
US11621955B2 (en)*2016-04-052023-04-04International Business Machines CorporationDelivering digital identity documents that are vetted as trusted in a secured manner
US10644875B2 (en)*2016-04-282020-05-05International Business Machines CorporationPre-authorization of public key infrastructure
USD915419S1 (en)2016-05-102021-04-06Citrix Systems, Inc.Display screen or portion thereof with transitional graphical user interface
CN113411317B (en)*2016-05-112023-05-26创新先进技术有限公司Identity verification method and system and intelligent wearable device
US10148649B2 (en)*2016-05-182018-12-04Vercrio, Inc.Automated scalable identity-proofing and authentication process
US11843597B2 (en)*2016-05-182023-12-12Vercrio, Inc.Automated scalable identity-proofing and authentication process
US10104526B2 (en)*2016-06-012018-10-16Motorola Solutions, Inc.Method and apparatus for issuing a credential for an incident area network
US10135622B2 (en)*2016-06-032018-11-20Intel CorporationFlexible provisioning of attestation keys in secure enclaves
US11886611B1 (en)2016-07-012024-01-30Wells Fargo Bank, N.A.Control tower for virtual rewards currency
US11386223B1 (en)2016-07-012022-07-12Wells Fargo Bank, N.A.Access control tower
US12130937B1 (en)2016-07-012024-10-29Wells Fargo Bank, N.A.Control tower for prospective transactions
US11935020B1 (en)2016-07-012024-03-19Wells Fargo Bank, N.A.Control tower for prospective transactions
US11615402B1 (en)2016-07-012023-03-28Wells Fargo Bank, N.A.Access control tower
US10992679B1 (en)2016-07-012021-04-27Wells Fargo Bank, N.A.Access control tower
LU93150B1 (en)*2016-07-132018-03-05Luxtrust S AMethod for providing secure digital signatures
US10769635B2 (en)2016-08-052020-09-08Nok Nok Labs, Inc.Authentication techniques including speech and/or lip movement analysis
US10637853B2 (en)2016-08-052020-04-28Nok Nok Labs, Inc.Authentication techniques including speech and/or lip movement analysis
CN106454823A (en)*2016-08-122017-02-22中国南方电网有限责任公司Authentication method for network security access and authentication system for implementing method
US10382428B2 (en)*2016-09-212019-08-13Mastercard International IncorporatedSystems and methods for providing single sign-on authentication services
US10581847B1 (en)*2016-09-272020-03-03Amazon Technologies, Inc.Blockchain-backed device and user provisioning
US10440014B1 (en)*2016-09-302019-10-08Assa Abloy AbPortable secure access module
US11093207B1 (en)2016-10-282021-08-17Assa Abloy AbVisual verification of virtual credentials and licenses
DE102016221700A1 (en)*2016-11-042018-05-09Bundesdruckerei Gmbh A method for offline authentication of a virtual document
DE102016221699A1 (en)*2016-11-042018-05-09Bundesdruckerei Gmbh Procedure for issuing a virtual version of a document
US11080380B2 (en)*2016-11-082021-08-03Aware, Inc.Decentralized biometric identity authentication
US11074325B1 (en)*2016-11-092021-07-27Wells Fargo Bank, N.A.Systems and methods for dynamic bio-behavioral authentication
DE102016013990A1 (en)*2016-11-232018-05-24Giesecke+Devrient Mobile Security Gmbh Integrity check of a security-relevant application
US10140440B1 (en)*2016-12-132018-11-27Symantec CorporationSystems and methods for securing computing devices that are not in users' physical possessions
CN106899570B (en)*2016-12-142019-11-05阿里巴巴集团控股有限公司The processing method of two dimensional code, apparatus and system
US10091195B2 (en)*2016-12-312018-10-02Nok Nok Labs, Inc.System and method for bootstrapping a user binding
US10237070B2 (en)2016-12-312019-03-19Nok Nok Labs, Inc.System and method for sharing keys across authenticators
US9992022B1 (en)2017-02-062018-06-05Northern Trust CorporationSystems and methods for digital identity management and permission controls within distributed network nodes
GB2563742A (en)*2017-02-062018-12-26Northern Trust CorpSystems and methods for digital identity management and permission controls within distributed network nodes
KR102563897B1 (en)*2017-02-212023-08-07삼성전자주식회사Method for managing identification information and electronic device supporting the same
US11025436B2 (en)*2017-03-012021-06-01Banco Bilbao Vizcaya Argentaria, S.A.Self-authenticating digital identity
US10476862B2 (en)2017-03-312019-11-12Mastercard International IncorporatedSystems and methods for providing digital identity records to verify identities of users
US11556936B1 (en)2017-04-252023-01-17Wells Fargo Bank, N.A.System and method for card control
US11062388B1 (en)2017-07-062021-07-13Wells Fargo Bank, N.AData control tower
WO2019032113A1 (en)*2017-08-102019-02-14Visa International Service AssociationBiometric verification process using certification token
US11983723B2 (en)2017-09-152024-05-14Pearson Education, Inc.Tracking digital credential usage in a sensor-monitored environment
US11122036B2 (en)2017-09-182021-09-14Mastercard International IncorporatedSystems and methods for managing digital identities associated with mobile devices
US10862883B1 (en)*2017-10-092020-12-08Amazon Technologies, Inc.Custom authorization of network connected devices using signed credentials
US11868995B2 (en)2017-11-272024-01-09Nok Nok Labs, Inc.Extending a secure key storage for transaction confirmation and cryptocurrency
US9990504B1 (en)2017-12-182018-06-05Northern Trust CorporationSystems and methods for generating and maintaining immutable digital meeting records within distributed network nodes
EP3502941B1 (en)*2017-12-192021-01-20Riddle & Code GmbHDongles and method for providing a digital signature
US11831409B2 (en)2018-01-122023-11-28Nok Nok Labs, Inc.System and method for binding verifiable claims
US11100503B2 (en)2018-02-072021-08-24Mastercard International IncorporatedSystems and methods for use in managing digital identities
US11153326B2 (en)*2018-02-122021-10-19Fmr LlcSecure distribution and sharing of meeting content
US20190273618A1 (en)*2018-03-052019-09-05Roger G. MarshallFAKEOUT© Software System - An electronic apostille-based real time content authentication technique for text, audio and video transmissions
US20190319948A1 (en)*2018-04-112019-10-17Settleware Secure Services, Inc.Remote authentication and identification proofing systems and methods
WO2019200190A1 (en)*2018-04-132019-10-17Mastercard International IncorporatedSystems and methods for use in providing digital identities
PT3782058T (en)*2018-04-202024-06-18Gupta VishalDecentralized document and entity verification engine
US10839057B1 (en)*2018-05-072020-11-17Wells Fargo Bank, N.A.Systems and methods for providing electronic infrastructure on paper documents
US11777744B2 (en)*2018-06-252023-10-03Auth9, Inc.Method, computer program product and apparatus for creating, registering, and verifying digitally sealed assets
CN112106324A (en)*2018-06-252020-12-18Auth9股份有限公司Methods, computer program products and devices for creating, registering and verifying digitally stamped assets
KR102553145B1 (en)*2018-07-242023-07-07삼성전자주식회사A secure element for processing and authenticating a digital key and operation metho thereof
CN109118236B (en)*2018-08-082022-01-28富途网络科技(深圳)有限公司Trading method for identity authentication based on human body biological characteristic information
US10764752B1 (en)*2018-08-212020-09-01HYPR Corp.Secure mobile initiated authentication
US10939295B1 (en)2018-08-212021-03-02HYPR Corp.Secure mobile initiated authentications to web-services
US11178148B2 (en)2018-08-212021-11-16HYPR Corp.Out-of-band authentication to access web-service with indication of physical access to client device
US10601828B2 (en)*2018-08-212020-03-24HYPR Corp.Out-of-band authentication based on secure channel to trusted execution environment on client device
US11057366B2 (en)*2018-08-212021-07-06HYPR Corp.Federated identity management with decentralized computing platforms
US10970576B2 (en)*2018-08-272021-04-06Daon Holdings LimitedMethods and systems for capturing image data
CN110876144B (en)*2018-08-302023-07-11华为技术有限公司 A mobile application method, device and system for an identity credential
CN111064573B (en)*2018-10-162022-10-11金联汇通信息技术有限公司Digital certificate generation method, authentication method and electronic equipment
CN111222108B (en)*2018-11-272022-07-12天地融科技股份有限公司Cloud identity card implementation method and system
CN111224926B (en)*2018-11-272022-05-13天地融科技股份有限公司Cloud identity card realization method and system
US12406271B2 (en)2019-01-172025-09-02International Business Machines CorporationIdentity proofing for online accounts
US12041039B2 (en)2019-02-282024-07-16Nok Nok Labs, Inc.System and method for endorsing a new authenticator
KR102157453B1 (en)2019-03-292020-09-18알리바바 그룹 홀딩 리미티드 Cryptographic chip using identity verification
JP2020521341A (en)*2019-03-292020-07-16アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Cryptographic key management based on identification information
SG11201908931TA (en)2019-03-292019-10-30Alibaba Group Holding LtdCryptographic key management based on identity information
US11792024B2 (en)2019-03-292023-10-17Nok Nok Labs, Inc.System and method for efficient challenge-response authentication
CN110999254B (en)2019-03-292023-02-28创新先进技术有限公司Securely performing cryptographic operations
US11151576B2 (en)2019-04-052021-10-19At&T Intellectual Property I, L.P.Authorizing transactions using negative pin messages
US11388011B2 (en)*2019-04-082022-07-12Cisco Technology, Inc.Accountable identities on the internet
US11367125B1 (en)*2019-04-102022-06-21Waitbusters LlcSystems and methods for processing electronic requests
CN110191123B (en)*2019-05-292022-02-18中国联合网络通信集团有限公司Online card handling method, client and system
WO2020257472A1 (en)*2019-06-182020-12-24Transmute Industries, Inc.Systems and methods for a decentralized data authentication platform
CN110598826A (en)*2019-09-032019-12-20数字广东网络建设有限公司Electronic certificate classified display method, device and system and computer equipment
US12072963B2 (en)*2019-09-252024-08-27Amod Ashok DangeSystem and method for affixing a signature using biometric authentication
US12028347B2 (en)2019-09-252024-07-02Amod Ashok DangeSystem and method for enabling a user to obtain authenticated access to an application using a biometric combination lock
US12026247B2 (en)2019-09-252024-07-02Amod Ashok DangeSystem and method for enabling a user to create an account on an application or login into the application without having the user reveal their identity
US12079367B2 (en)2019-09-252024-09-03Amod Ashok DangeSystem and method for enabling social network users to grant their connections granular visibility into their personal data without granting the same visibility to the network operator
CN110955917B (en)*2019-10-282024-02-02航天信息股份有限公司Method and system for verifying electronic certificates related to multiple participants
US11606198B2 (en)*2020-01-222023-03-14Valimail Inc.Centrally managed PKI provisioning and rotation
CN111614466B (en)*2020-03-312023-07-14尚承科技股份有限公司 System and method for secure certificate issuance and management
US11991292B2 (en)*2020-04-032024-05-21Mastercard International IncorporatedSystems and methods for use in appending log entries to data structures
US11637821B2 (en)*2020-05-112023-04-25Samsung Electronics Co., Ltd.System and method for certificate based authentication for tethering
US11184395B1 (en)*2020-05-132021-11-23International Business Machines CorporationCross-network identity provisioning
WO2022046071A1 (en)*2020-08-282022-03-03Hewlett-Packard Development Company, L.P.Issuing secret shares
US10992606B1 (en)2020-09-042021-04-27Wells Fargo Bank, N.A.Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
CN114168929A (en)*2020-09-102022-03-11华为终端有限公司Identity authentication method, device, equipment and storage medium
US12221068B2 (en)*2020-10-232025-02-11Ford Global Technologies, LlcBiometric authenticated vehicle start with paired sensor to key intrustion detection
CN112561004A (en)*2020-11-172021-03-26厦门攸信信息技术有限公司Lost article retrieval system and method and seal carving machine
US12021861B2 (en)*2021-01-042024-06-25Bank Of America CorporationIdentity verification through multisystem cooperation
US11546338B1 (en)2021-01-052023-01-03Wells Fargo Bank, N.A.Digital account controls portal and protocols for federated and non-federated systems and devices
US11599677B2 (en)*2021-04-302023-03-07People Center, Inc.Synchronizing organizational data across a plurality of third-party applications
US12126613B2 (en)2021-09-172024-10-22Nok Nok Labs, Inc.System and method for pre-registration of FIDO authenticators
CN114095211B (en)*2021-10-292023-08-22新大陆(福建)公共服务有限公司Trusted digital identity personnel verification method and system
CN114398613B (en)*2021-10-312024-07-05上海零数众合信息科技有限公司Method for generating computer trusted business card based on blockchain
US20230155835A1 (en)*2021-11-172023-05-18Charles Stephen EdgeSystem, method, apparatus, and computer program product providing improved password security
US11734972B2 (en)*2021-11-242023-08-22Rivian Ip Holdings, LlcSystems and methods for securely managing vehicle information
US20230195928A1 (en)*2021-12-162023-06-22Paypal, Inc.Detection and protection of personal data in audio/video calls
CN114312070B (en)*2021-12-222024-02-13胡金钱 Intelligent stamp device in multi-functional area and method of generating stamp image in multi-functional area
CN115221498A (en)*2022-01-052022-10-21胡金钱 Digital asset management terminal device and digital asset management method
CN114580030A (en)*2022-01-282022-06-03公安部交通管理科学研究所Safe generation method, client and system for traffic management electronic document
CN114385981B (en)*2022-01-292025-08-29浙江大学 A method and device for generating digital rights proof of physical artwork
CN114666045B (en)*2022-03-142024-12-06胡金钱 Family business pre-authentication device and family business pre-authentication method
CN114726540B (en)*2022-04-062024-01-02芯安微众(上海)微电子技术有限公司Vehicle credible digital identity generation method
US12155641B1 (en)2022-04-152024-11-26Wells Fargo Bank, N.A.Network access tokens and meta-application programming interfaces for enhanced inter-enterprise system data promulgation and profiling
CN114900321B (en)*2022-07-142022-10-14云上人和物联科技有限公司Autonomous real-name electronic identity certificate generation system and method
US20240259204A1 (en)*2022-08-082024-08-01Finema Company LimitedMethod for Secure Privacy-Preserving Device-Free Biometric Signing with Multi-Party Computation and Cancelable Biometric Template
CN115361146B (en)*2022-10-242023-03-10中安网脉(北京)技术股份有限公司Electronic seal system and method compatible with multiple cryptographic algorithms
US12438730B2 (en)2022-11-042025-10-07AVAST Software s.r.o.Systems and methods for reputation-based transactions over a network
NL1044483B1 (en)*2022-12-102024-06-14Wellet B VMethod for electronic signing with multiple signing keys allowing proof of using same possession factor
US20250053962A1 (en)*2023-08-112025-02-13Dentity Partners, Inc.Apparatus and method for scoring digital identity attribute levels in a computer network with multiple enterprise participants
CN117132242B (en)*2023-10-262024-01-23北京点聚信息技术有限公司Electronic seal identity authority safety management method
US20250159011A1 (en)*2023-11-122025-05-15Computed Future, IncSystems and methods for detecting and mitigating cyber security threats
CN118400113B (en)*2024-05-242024-12-13上海迅傲信息科技有限公司Information docking method, system, equipment and medium based on system security detection
CN120145355A (en)*2025-05-162025-06-13中安网脉(北京)技术股份有限公司 A data rights confirmation method based on subject and object binding and data liveness

Citations (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020026577A1 (en)*2000-08-312002-02-28Sony CorporationPerson authentication system, person authentication method, information processing apparatus, and program providing medium
US6401206B1 (en)1997-03-062002-06-04Skylight Software, Inc.Method and apparatus for binding electronic impressions made by digital identities to documents
US20030163686A1 (en)*2001-08-062003-08-28Ward Jean RenardSystem and method for ad hoc management of credentials, trust relationships and trust history in computing environments
WO2005020542A1 (en)2003-08-122005-03-03Intel CorporationMethod for using trusted, hardware-based identity credentials in runtime package signature to secure mobile communications and high-value transaction execution
US20050257045A1 (en)*2004-04-122005-11-17Bushman M BSecure messaging system
EP1130491B1 (en)2000-01-142006-03-08Hewlett-Packard Company, A Delaware CorporationDigital certificate including authorization data
EP1470534B1 (en)2002-01-222006-10-04Oracle International CorporationMethod and apparatus for facilitating low-cost and scalable digital identification authentication
US20070101434A1 (en)*2005-07-142007-05-03Ironkey, Inc.Recovery of encrypted data from a secure storage device
US7310734B2 (en)2001-02-012007-12-183M Innovative Properties CompanyMethod and system for securing a computer network and personal identification device used therein for controlling access to network components
US20080046758A1 (en)*2006-05-052008-02-21Interdigital Technology CorporationDigital rights management using trusted processing techniques
US20080248779A1 (en)*2007-04-042008-10-09The Hong Kong University Of Science And TechnologyMedia content and mobile devices
US7565540B2 (en)2003-02-052009-07-21Accenture Global Services GmbhFully electronic identity authentication
US7660988B2 (en)2002-03-182010-02-09Cognomina, Inc.Electronic notary
US20100191830A1 (en)*2009-01-232010-07-29Samsung Electronics Co., Ltd.Method and apparatus for providing community widget
US8019691B2 (en)2002-09-102011-09-13Visa International Service AssociationProfile and identity authentication service
US8127228B2 (en)2003-09-022012-02-28International Business Machines CorporationManaging electronic documents utilizing a digital seal
EP2460307A1 (en)2009-07-312012-06-06Anakam, Inc.System and method for strong remote identity proofing
US20140035720A1 (en)*2010-04-302014-02-06Bryan P. ChapmanMultiface document
US20140165151A1 (en)*2012-12-072014-06-12At&T Intellectual Property I, L.P.Non-Native Device Authentication

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH1011509A (en)*1996-06-261998-01-16Wacom Co LtdElectronic document security system, electronic stamping security system and electronic signature security system
CA2418050C (en)*2000-08-042014-05-20First Data CorporationLinking public key of device to information during manufacture
JP2002140630A (en)*2000-11-012002-05-17Sony CorpSystem and method for clearing contents charge based on ticket
WO2004105311A1 (en)*2003-05-152004-12-02Dean Joseph WhitmoreMethod and system for digitally signing electronic documents
US20050125666A1 (en)*2003-12-082005-06-09Shu-Ming LinMethod of using an electronic seal for inserting an electronic seal into contents of a document in a computer system
US20050188204A1 (en)*2004-02-232005-08-25Robert RiceElectronic notary service
US8694788B1 (en)*2005-04-292014-04-08Progressive Casualty Insurance CompanySecurity system
US8200975B2 (en)*2005-06-292012-06-12Microsoft CorporationDigital signatures for network forms
US20070235517A1 (en)*2006-03-302007-10-11O'connor Clint HSecure digital delivery seal for information handling system
US20090031135A1 (en)*2007-07-272009-01-29Raghunathan KothandaramanTamper Proof Seal For An Electronic Document
JP2011082923A (en)*2009-10-092011-04-21Sony CorpTerminal device, signature producing server, simple id management system, simple id management method, and program

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6401206B1 (en)1997-03-062002-06-04Skylight Software, Inc.Method and apparatus for binding electronic impressions made by digital identities to documents
EP1130491B1 (en)2000-01-142006-03-08Hewlett-Packard Company, A Delaware CorporationDigital certificate including authorization data
US20020026577A1 (en)*2000-08-312002-02-28Sony CorporationPerson authentication system, person authentication method, information processing apparatus, and program providing medium
US7310734B2 (en)2001-02-012007-12-183M Innovative Properties CompanyMethod and system for securing a computer network and personal identification device used therein for controlling access to network components
US20030163686A1 (en)*2001-08-062003-08-28Ward Jean RenardSystem and method for ad hoc management of credentials, trust relationships and trust history in computing environments
EP1470534B1 (en)2002-01-222006-10-04Oracle International CorporationMethod and apparatus for facilitating low-cost and scalable digital identification authentication
US7660988B2 (en)2002-03-182010-02-09Cognomina, Inc.Electronic notary
US8019691B2 (en)2002-09-102011-09-13Visa International Service AssociationProfile and identity authentication service
US7565540B2 (en)2003-02-052009-07-21Accenture Global Services GmbhFully electronic identity authentication
WO2005020542A1 (en)2003-08-122005-03-03Intel CorporationMethod for using trusted, hardware-based identity credentials in runtime package signature to secure mobile communications and high-value transaction execution
US8127228B2 (en)2003-09-022012-02-28International Business Machines CorporationManaging electronic documents utilizing a digital seal
US20050257045A1 (en)*2004-04-122005-11-17Bushman M BSecure messaging system
US20070101434A1 (en)*2005-07-142007-05-03Ironkey, Inc.Recovery of encrypted data from a secure storage device
US20080046758A1 (en)*2006-05-052008-02-21Interdigital Technology CorporationDigital rights management using trusted processing techniques
US20080248779A1 (en)*2007-04-042008-10-09The Hong Kong University Of Science And TechnologyMedia content and mobile devices
US20100191830A1 (en)*2009-01-232010-07-29Samsung Electronics Co., Ltd.Method and apparatus for providing community widget
EP2460307A1 (en)2009-07-312012-06-06Anakam, Inc.System and method for strong remote identity proofing
US20140035720A1 (en)*2010-04-302014-02-06Bryan P. ChapmanMultiface document
US20140165151A1 (en)*2012-12-072014-06-12At&T Intellectual Property I, L.P.Non-Native Device Authentication

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
Finney, H. et. al., Internet Engineering Taskforce (IETF), Open PGP Message Format, Network Working Group, Nov. 2007.
FIPS Pub 201-2, Federal Information Processing Standards Publication, Personal Identity Verification (PIV) of Federal Employees and Contractors.
Gary Blair, SMS-delivered two-factor authentication will be dead in three years, 2007.
Ma, L., Tan, T., Wang, Y., and Zhang, D., "Efficient iris recognition by characterizing key local variations". IEEE Trans. Image Processing 13.6 (2004).
Paul Madsen (editor), Liberty Alliance Project White Paper, Liberty ID-WSF People Service, Dec. 5, 2005.
PKCS 12 v1.0: Personal Information Exchange Syntax, RSA Laboratories, Jun. 24, 1999.
RSA Laboratories, B. Kaliski, PKCS #5: Password-Based Cryptography Specification, Version 2.0, Sep. 2000.

Cited By (63)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10728039B2 (en)*2009-06-052020-07-28Signix, Inc.Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
US12015718B2 (en)2009-06-052024-06-18Signix, Inc.Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
US11516016B2 (en)2009-06-052022-11-29Signix, Inc.Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
US10756906B2 (en)2013-10-012020-08-25Kalman Csaba TothArchitecture and methods for self-sovereign digital identity
US10127378B2 (en)2014-10-012018-11-13Kalman Csaba TothSystems and methods for registering and acquiring E-credentials using proof-of-existence and digital seals
US10852925B2 (en)2014-10-102020-12-01Salesforce.Com, Inc.Dashboard builder with live data updating without exiting an edit mode
US10101889B2 (en)2014-10-102018-10-16Salesforce.Com, Inc.Dashboard builder with live data updating without exiting an edit mode
US10963477B2 (en)2014-10-102021-03-30Salesforce.Com, Inc.Declarative specification of visualization queries
US10049141B2 (en)2014-10-102018-08-14salesforce.com,inc.Declarative specification of visualization queries, display formats and bindings
US20160344741A1 (en)*2014-10-102016-11-24Salesforce.Com, Inc.Integration User for Analytical Access To Read Only Data Stores Generated From Transactional Systems
US9923901B2 (en)*2014-10-102018-03-20Salesforce.Com, Inc.Integration user for analytical access to read only data stores generated from transactional systems
US11954109B2 (en)2014-10-102024-04-09Salesforce, Inc.Declarative specification of visualization queries
US10270774B1 (en)2015-01-262019-04-23Microstrategy IncorporatedElectronic credential and analytics integration
US11456876B2 (en)*2015-03-262022-09-27Assa Abloy AbVirtual credentials and licenses
US11544367B2 (en)2015-05-052023-01-03Ping Identity CorporationSystems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual
US10115213B2 (en)2015-09-152018-10-30Salesforce, Inc.Recursive cell-based hierarchy for data visualizations
US10089368B2 (en)2015-09-182018-10-02Salesforce, Inc.Systems and methods for making visual data representations actionable
US10877985B2 (en)2015-09-182020-12-29Salesforce.Com, Inc.Systems and methods for making visual data representations actionable
US12261852B2 (en)2015-10-142025-03-25Blockchains, Inc.Systems and methods for managing digital identities
US10721227B1 (en)*2015-12-172020-07-21Wells Fargo Bank, N.A.Identity management system
US12166755B2 (en)*2015-12-172024-12-10Wells Fargo Bank, N.A.Identity management system
US10129252B1 (en)*2015-12-172018-11-13Wells Fargo Bank, N.A.Identity management system
US20230208834A1 (en)*2015-12-172023-06-29Wells Fargo Bank, N.A.Identity management system
US11601421B1 (en)*2015-12-172023-03-07Wells Fargo Bank, N.A.Identity management system
US11134075B2 (en)2016-03-042021-09-28Ping Identity CorporationMethod and system for authenticated login using static or dynamic codes
US11658961B2 (en)2016-03-042023-05-23Ping Identity CorporationMethod and system for authenticated login using static or dynamic codes
US11263415B2 (en)2016-03-072022-03-01Ping Identity CorporationTransferring data files using a series of visual codes
US11062106B2 (en)2016-03-072021-07-13Ping Identity CorporationLarge data transfer using visual codes with feedback confirmation
US11544487B2 (en)2016-03-072023-01-03Ping Identity CorporationLarge data transfer using visual codes with feedback confirmation
US10007826B2 (en)*2016-03-072018-06-26ShoCard, Inc.Transferring data files using a series of visual codes
US20170255805A1 (en)*2016-03-072017-09-07ShoCard, Inc.Transferring Data Files Using a Series of Visual Codes
US10523660B1 (en)*2016-05-132019-12-31MobileIron, Inc.Asserting a mobile identity to users and devices in an enterprise authentication system
US10673838B2 (en)2016-05-132020-06-02MobileIron, Inc.Unified VPN and identity based authentication to cloud-based services
US11178132B2 (en)*2016-05-132021-11-16MobileIron, Inc.Unified VPN and identity based authentication to cloud-based services
US11368449B2 (en)2016-05-132022-06-21Mobileiron Inc.Asserting a mobile identity to users and devices in an enterprise authentication system
US11126616B2 (en)2016-10-192021-09-21Salesforce.Com, Inc.Streamlined creation and updating of olap analytic databases
US10311047B2 (en)2016-10-192019-06-04Salesforce.Com, Inc.Streamlined creation and updating of OLAP analytic databases
US11323272B2 (en)2017-02-062022-05-03Ping Identity CorporationElectronic identification verification methods and systems with storage of certification records to a side chain
USRE49968E1 (en)2017-02-062024-05-14Ping Identity CorporationElectronic identification verification methods and systems with storage of certification records to a side chain
US11799668B2 (en)2017-02-062023-10-24Ping Identity CorporationElectronic identification verification methods and systems with storage of certification records to a side chain
US11044087B2 (en)*2017-11-152021-06-22Alexander J. M. Van Der VeldenSystem for digital identity authentication and methods of use
US11206133B2 (en)2017-12-082021-12-21Ping Identity CorporationMethods and systems for recovering data using dynamic passwords
US11777726B2 (en)2017-12-082023-10-03Ping Identity CorporationMethods and systems for recovering data using dynamic passwords
CN108199836B (en)*2018-01-222020-04-03北京大学Method and device for binding and unbinding key and equipment
CN108199836A (en)*2018-01-222018-06-22北京大学A kind of key and apparatus bound, the method and device of solution binding
CN110278084B (en)*2018-03-162021-10-15华为技术有限公司 eID establishment method, related equipment and system
CN110278084A (en)*2018-03-162019-09-24华为技术有限公司 eID establishment method, related equipment and system
US20240137362A1 (en)*2018-06-082024-04-25Wells Fargo Bank, N.A.Two-way authentication system and method
US11190507B2 (en)*2018-09-272021-11-30Apple Inc.Trusted device establishment
US11722301B2 (en)2018-10-172023-08-08Ping Identity CorporationBlockchain ID connect
US11082221B2 (en)2018-10-172021-08-03Ping Identity CorporationMethods and systems for creating and recovering accounts using dynamic passwords
US11818265B2 (en)2018-10-172023-11-14Ping Identity CorporationMethods and systems for creating and recovering accounts using dynamic passwords
US10979227B2 (en)2018-10-172021-04-13Ping Identity CorporationBlockchain ID connect
US11574037B1 (en)*2018-12-112023-02-07Bullish GlobalCreating a secure digital identity
US10789345B1 (en)*2018-12-112020-09-29block.oneCreating a secure digital identity
US10325084B1 (en)*2018-12-112019-06-18block.oneSystems and methods for creating a secure digital identity
US11251958B2 (en)*2019-08-122022-02-15Bank Of America CorporationSecurity system with adaptive authentication based on tokenization chaining
US20220014414A1 (en)*2020-07-072022-01-13Realtek Semiconductor Corp.Method and system for authentication data transmission
US11870774B2 (en)*2020-07-072024-01-09Realtek Semiconductor Corp.Method and system for authentication data transmission
US11170130B1 (en)2021-04-082021-11-09Aster Key, LLCApparatus, systems and methods for storing user profile data on a distributed database for anonymous verification
US20240104295A1 (en)*2022-09-222024-03-28Adobe Inc.Systems and methods for joint document signing
US20240205013A1 (en)*2022-12-202024-06-20International Business Machines CorporationPrivacy preserving authentication augmented with physical biometric proof
US12014096B1 (en)2023-09-142024-06-18Bank Of America CorporationSystem and method for remote authentication based on computer-vision technologies

Also Published As

Publication numberPublication date
US20150095999A1 (en)2015-04-02
US20170230361A1 (en)2017-08-10
US9900309B2 (en)2018-02-20

Similar Documents

PublicationPublication DateTitle
US10127378B2 (en)Systems and methods for registering and acquiring E-credentials using proof-of-existence and digital seals
US9900309B2 (en)Methods for using digital seals for non-repudiation of attestations
US10756906B2 (en)Architecture and methods for self-sovereign digital identity
US11803633B1 (en)Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates
US20220407720A1 (en)Electronic identification verification methods and systems with storage of certification records to a side chain
US11088855B2 (en)System and method for verifying an identity of a user using a cryptographic challenge based on a cryptographic operation
EP3721578B1 (en)Methods and systems for recovering data using dynamic passwords
US12166881B2 (en)Digital notarization using a biometric identification service
US20180288031A1 (en)Collection point anchored multi-property identity based application specific token origination
US20100185864A1 (en)Multi-Dimensional Credentialing Using Veiled Certificates
Bernabe et al.ARIES: Evaluation of a reliable and privacy-preserving European identity management framework
US20220005039A1 (en)Delegation method and delegation request managing method
US20240364526A1 (en)Methods and systems for generating and validating uses of digital credentials and other documents
Jang et al.Biometric enabled portable trusted computing platform
Sadhya et al.A critical survey of the security and privacy aspects of the Aadhaar framework
US20200177584A1 (en)Account Access
USRE49968E1 (en)Electronic identification verification methods and systems with storage of certification records to a side chain
Reece et al.Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases
Burr et al.Sp 800-63-1. electronic authentication guideline
Toth et al.Architecture for self-sovereign digital identity
US20200204377A1 (en)Digital notarization station that uses a biometric identification service
Chen et al.A trusted biometric system
TothBrewing Next Generation Identity
Xing et al.Blockchain E-Certificate System with Ethereum Network And IPFS
AllianceStrong authentication using smart card technology for logical access

Legal Events

DateCodeTitleDescription
STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, MICRO ENTITY (ORIGINAL EVENT CODE: M3551); ENTITY STATUS OF PATENT OWNER: MICROENTITY

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, MICRO ENTITY (ORIGINAL EVENT CODE: M3552); ENTITY STATUS OF PATENT OWNER: MICROENTITY

Year of fee payment:8


[8]ページ先頭

©2009-2025 Movatter.jp